MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2c25b70f08a34cc52989882c4715854c4f488dacfa2c4a615ce5f8c265b21862. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 2c25b70f08a34cc52989882c4715854c4f488dacfa2c4a615ce5f8c265b21862
SHA3-384 hash: 8fc35930c350608d8f61e80491303a5ee2be0ed7d85495e82c190ea54dfc799731f3133e8678e06cc8a2d8e300c9f210
SHA1 hash: 5bfadbe22a7b3a1db3cb5a7f2ec224f4e44c7bd0
MD5 hash: 9630e11f88c832c3c7a5da18ef9cc0ac
humanhash: moon-november-tennessee-cup
File name:2c25b70f08a34cc52989882c4715854c4f488dacfa2c4.exe
Download: download sample
Signature RedLineStealer
File size:241'152 bytes
First seen:2023-01-19 02:15:15 UTC
Last seen:2023-01-19 03:28:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash dd0e4efabc62274a7cfb37b4b7a2951d (17 x Amadey, 5 x RedLineStealer, 1 x Stop)
ssdeep 6144:WfSsOzqs7nAV3QN2tW0J3SluVy3VYlSgXqgkX:jbN6J4uVy3VmSga
TLSH T1A9340A217916C031C960617729B9BFF2C19DB8259B7049DB7B800F7BDA112E67A70E3D
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
85.209.135.29:8081

Intelligence


File Origin
# of uploads :
2
# of downloads :
244
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
2c25b70f08a34cc52989882c4715854c4f488dacfa2c4a615ce5f8c265b21862
Verdict:
Malicious activity
Analysis date:
2023-01-16 01:35:55 UTC
Tags:
trojan amadey

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching cmd.exe command interpreter
Adding an access-denied ACE
DNS request
Sending an HTTP GET request
Searching for synchronization primitives
Creating a window
Creating a file
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Connecting to a non-recommended domain
Reading critical registry keys
Running batch commands
Launching the process to change network settings
Creating a file in the %AppData% subdirectories
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Stealing user critical data
Query of malicious DNS domain
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
GetTempPath
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
No Threat
Threat level:
  2/10
Confidence:
67%
Tags:
greyware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Aurora, Amadey, Eternity Stealer, LockBi
Detection:
malicious
Classification:
rans.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Posts data to a JPG file (protocol mismatch)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Capture Wi-Fi password
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara Aurora Stealer
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Eternity Stealer
Yara detected Generic Downloader
Yara detected LockBit ransomware
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 787067 Sample: 2c25b70f08a34cc52989882c471... Startdate: 19/01/2023 Architecture: WINDOWS Score: 100 142 Snort IDS alert for network traffic 2->142 144 Malicious sample detected (through community Yara rule) 2->144 146 Antivirus detection for URL or domain 2->146 148 22 other signatures 2->148 10 2c25b70f08a34cc52989882c4715854c4f488dacfa2c4.exe 4 2->10         started        14 nbveek.exe 2->14         started        16 vertu.exe 2->16         started        process3 file4 92 C:\Users\user\AppData\Local\...\nbveek.exe, PE32 10->92 dropped 94 C:\Users\user\...\nbveek.exe:Zone.Identifier, ASCII 10->94 dropped 192 Contains functionality to inject code into remote processes 10->192 18 nbveek.exe 2 75 10->18         started        signatures5 process6 dnsIp7 118 62.204.41.121, 49696, 49697, 49698 TNNET-ASTNNetOyMainnetworkFI United Kingdom 18->118 120 62.204.41.32, 49707, 80 TNNET-ASTNNetOyMainnetworkFI United Kingdom 18->120 122 6 other IPs or domains 18->122 84 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 18->84 dropped 86 C:\Users\user\AppData\...\buildppb.exe, PE32 18->86 dropped 88 C:\Users\user\AppData\Local\Temp\...\tube.exe, PE32 18->88 dropped 90 33 other malicious files 18->90 dropped 166 Multi AV Scanner detection for dropped file 18->166 168 Creates an undocumented autostart registry key 18->168 170 Found stalling execution ending in API Sleep call 18->170 172 2 other signatures 18->172 23 qiv1ow16wzuw.exe 18->23         started        26 Player3.exe 18->26         started        29 Amadey.exe 18->29         started        31 8 other processes 18->31 file8 signatures9 process10 dnsIp11 174 Multi AV Scanner detection for dropped file 23->174 176 Writes to foreign memory regions 23->176 178 Allocates memory in foreign processes 23->178 180 Injects a PE file into a foreign processes 23->180 34 vbc.exe 23->34         started        38 conhost.exe 23->38         started        40 WerFault.exe 23->40         started        96 C:\Users\user\AppData\Local\...\nbveek.exe, PE32 26->96 dropped 42 nbveek.exe 26->42         started        98 C:\Users\user\AppData\Local\...\nbveek.exe, PE32 29->98 dropped 45 nbveek.exe 29->45         started        138 151.80.89.233 OVHFR Italy 31->138 140 62.204.41.159 TNNET-ASTNNetOyMainnetworkFI United Kingdom 31->140 100 C:\Users\user\AppData\Local\...\nbveek.exe, PE32 31->100 dropped 182 Antivirus detection for dropped file 31->182 184 Detected unpacking (changes PE section rights) 31->184 186 Detected unpacking (overwrites its own PE header) 31->186 188 7 other signatures 31->188 47 rundll32.exe 21 31->47         started        49 conhost.exe 31->49         started        51 conhost.exe 31->51         started        53 11 other processes 31->53 file12 signatures13 process14 dnsIp15 124 66.181.33.16 UNREAL-SERVERSUS United States 34->124 126 ip-api.com 208.95.112.1, 49703, 80 TUT-ASUS United States 34->126 134 3 other IPs or domains 34->134 150 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->150 152 May check the online IP address of the machine 34->152 154 Tries to steal Mail credentials (via file / registry access) 34->154 164 4 other signatures 34->164 55 cmd.exe 34->55         started        58 cmd.exe 34->58         started        136 5 other IPs or domains 42->136 102 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 42->102 dropped 104 C:\Users\user\AppData\Local\...\handdiy_1.exe, PE32 42->104 dropped 106 C:\Users\user\AppData\Local\...\random.exe, PE32 42->106 dropped 116 5 other malicious files 42->116 dropped 156 Multi AV Scanner detection for dropped file 42->156 60 cmd.exe 42->60         started        62 schtasks.exe 42->62         started        128 193.42.33.28 EENET-ASEE Germany 45->128 130 escrow.lol 172.67.220.72 CLOUDFLARENETUS United States 45->130 108 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 45->108 dropped 110 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 45->110 dropped 112 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 45->112 dropped 114 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32+ 45->114 dropped 132 192.168.2.1 unknown unknown 47->132 158 System process connects to network (likely due to code injection or exploit) 47->158 160 Tries to steal Instant Messenger accounts or passwords 47->160 162 Tries to harvest and steal ftp login credentials 47->162 64 tar.exe 47->64         started        file16 signatures17 process18 signatures19 190 Tries to harvest and steal WLAN passwords 55->190 66 conhost.exe 55->66         started        68 chcp.com 55->68         started        70 netsh.exe 55->70         started        72 findstr.exe 55->72         started        74 conhost.exe 58->74         started        80 3 other processes 58->80 82 3 other processes 60->82 76 conhost.exe 62->76         started        78 conhost.exe 64->78         started        process20
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2023-01-16 10:40:27 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
28 of 39 (71.79%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:eternity family:raccoon family:redline family:socelars family:xworm botnet:571391c08bcfc49c97149aeb137899e0 botnet:@dridexxsupport ( http://t.me/dridexxhackingtutorials ) botnet:@redlinevip cloud (tg: @fatherofcarders) botnet:antivirus botnet:neste botnet:redlin botnet:vertu collection discovery infostealer persistence ransomware rat spyware stealer trojan vmprotect
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops desktop.ini file(s)
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
Modifies extensions of user files
VMProtect packed file
Amadey
Eternity
Process spawned unexpected child process
Raccoon
RedLine
RedLine payload
Socelars
Socelars payload
Xworm
Malware Config
C2 Extraction:
62.204.41.121/ZxhssZx/index.php
maximumpushtodaynotnowbut.com/Nmkn5d9Dn/index.php
motiontodaynotgogoodnowok.com/Nmkn5d9Dn/index.php
sogoodnowtodaynow.com/Nmkn5d9Dn/index.php
151.80.89.233:13553
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
62.204.41.159:4062
193.47.61.243:80
45.88.67.20:80
91.107.159.152:33685
http://185.180.199.215
154.7.253.146:40762
154.26.155.71:36391
45.88.67.183:7304
77.73.134.27/8bmdh3Slb2/index.php
193.42.33.28/8bmdh3Slb2/index.php
https://hdbywe.s3.us-west-2.amazonaws.com/sdfeas18/
sym.publicvm.com:6364
Unpacked files
SH256 hash:
2c25b70f08a34cc52989882c4715854c4f488dacfa2c4a615ce5f8c265b21862
MD5 hash:
9630e11f88c832c3c7a5da18ef9cc0ac
SHA1 hash:
5bfadbe22a7b3a1db3cb5a7f2ec224f4e44c7bd0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:win_amadey_a9f4
Author:Johannes Bader
Description:matches unpacked Amadey samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 2c25b70f08a34cc52989882c4715854c4f488dacfa2c4a615ce5f8c265b21862

(this sample)

  
Delivery method
Distributed via web download

Comments