MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2dd292dcc5d8e599d717242cb403360120308bed82e47709f6ae231202e1b0ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 5 YARA File information Comments

SHA256 hash: 2dd292dcc5d8e599d717242cb403360120308bed82e47709f6ae231202e1b0ff
SHA3-384 hash: ef41168072ce12df33deb9048f80e962a479424d2e3e2b85b55bfb795e64b23dc980635d73a2b6b80a99c4841d275b55
SHA1 hash: d4f4c653cb783792f1cf9a97cfadc1143e556edb
MD5 hash: a9049d13128ecd6f1f151527984028a7
humanhash: spaghetti-fix-jupiter-sierra
File name:a9049d13128ecd6f1f151527984028a7.exe
Download: download sample
Signature RedLineStealer
File size:3'322'310 bytes
First seen:2021-07-30 02:25:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:x6YoxuUBSlbkw33Iq9RE+ybwYQwf7CvLUBsKLX8:xbo5Sl4w34MahbwhRLUCKj8
Threatray 246 similar samples on MalwareBazaar
TLSH T1EDF53353B7EAC0B7E28480B2DE898B71C1FDC7481E7518937345816C5FAAAD2713ECA5
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
109.234.34.165:22204

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
109.234.34.165:22204 https://threatfox.abuse.ch/ioc/163783/
45.14.49.117:14251 https://threatfox.abuse.ch/ioc/163787/
185.230.143.16:32115 https://threatfox.abuse.ch/ioc/163855/
193.56.146.22:47861 https://threatfox.abuse.ch/ioc/164629/
45.93.4.12:80 https://threatfox.abuse.ch/ioc/164749/

Intelligence


File Origin
# of uploads :
1
# of downloads :
574
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a9049d13128ecd6f1f151527984028a7.exe
Verdict:
No threats detected
Analysis date:
2021-07-30 02:26:55 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large strings
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Drops PE files to the startup folder
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Sigma detected: Suspicious Process Start Without DLL
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Submitted sample is a known malware sample
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected AntiVM3
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 456636 Sample: MIN56KgzBN.exe Startdate: 30/07/2021 Architecture: WINDOWS Score: 100 137 95.181.179.21 NEOHOST-ASUA Russian Federation 2->137 139 s.lletlee.com 2->139 141 2 other IPs or domains 2->141 209 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->209 211 Multi AV Scanner detection for domain / URL 2->211 213 Antivirus detection for URL or domain 2->213 215 17 other signatures 2->215 13 MIN56KgzBN.exe 16 2->13         started        signatures3 process4 file5 105 C:\Users\user\AppData\...\setup_install.exe, PE32 13->105 dropped 107 C:\Users\user\AppData\Local\...\sahiba_8.txt, PE32+ 13->107 dropped 109 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32 13->109 dropped 111 11 other files (none is malicious) 13->111 dropped 16 setup_install.exe 1 13->16         started        process6 dnsIp7 133 watira.xyz 104.21.47.76, 49720, 80 CLOUDFLARENETUS United States 16->133 95 C:\Users\user\AppData\...\sahiba_8.exe (copy), PE32+ 16->95 dropped 97 C:\Users\user\AppData\...\sahiba_6.exe (copy), PE32 16->97 dropped 99 C:\Users\user\AppData\...\sahiba_5.exe (copy), PE32 16->99 dropped 101 5 other files (3 malicious) 16->101 dropped 203 Detected unpacking (changes PE section rights) 16->203 205 Performs DNS queries to domains with low reputation 16->205 21 cmd.exe 1 16->21         started        23 cmd.exe 1 16->23         started        25 cmd.exe 1 16->25         started        28 6 other processes 16->28 file8 signatures9 process10 signatures11 30 sahiba_6.exe 21->30         started        35 sahiba_3.exe 89 23->35         started        219 Submitted sample is a known malware sample 25->219 221 Obfuscated command line found 25->221 223 Uses ping.exe to sleep 25->223 225 Uses ping.exe to check the status of other devices and networks 25->225 37 sahiba_1.exe 2 25->37         started        39 sahiba_7.exe 28->39         started        41 sahiba_8.exe 28->41         started        43 sahiba_2.exe 1 28->43         started        45 2 other processes 28->45 process12 dnsIp13 149 i.spesgrt.com 30->149 151 37.0.11.9, 49723, 80 WKD-ASIE Netherlands 30->151 155 10 other IPs or domains 30->155 115 C:\Users\...\wpWDfE1z1eeDo4omZKZMRend.exe, PE32 30->115 dropped 117 C:\Users\...\sCrJhnDDGVMcDTv0FYpMEyKz.exe, PE32 30->117 dropped 119 C:\Users\...\jszZkZglvU5nHRZh6KL0YLxc.exe, PE32 30->119 dropped 125 41 other files (27 malicious) 30->125 dropped 171 Drops PE files to the document folder of the user 30->171 173 May check the online IP address of the machine 30->173 175 Creates HTML files with .exe extension (expired dropper behavior) 30->175 193 2 other signatures 30->193 157 2 other IPs or domains 35->157 127 12 other files (none is malicious) 35->127 dropped 177 Detected unpacking (changes PE section rights) 35->177 179 Detected unpacking (overwrites its own PE header) 35->179 181 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 35->181 183 Tries to steal Crypto Currency Wallets 35->183 185 Creates processes via WMI 37->185 47 sahiba_1.exe 37->47         started        51 cmd.exe 39->51         started        153 ip-api.com 208.95.112.1, 49731, 80 TUT-ASUS United States 41->153 159 2 other IPs or domains 41->159 121 C:\Users\user\AppData\...\fastsystem2021.exe, PE32+ 41->121 dropped 129 3 other files (1 malicious) 41->129 dropped 187 Drops PE files to the startup folder 41->187 53 11111.exe 41->53         started        56 11111.exe 41->56         started        123 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 43->123 dropped 189 DLL reload attack detected 43->189 195 2 other signatures 43->195 58 explorer.exe 43->58 injected 161 2 other IPs or domains 45->161 131 6 other files (none is malicious) 45->131 dropped 60 sahiba_4.tmp 45->60         started        file14 191 Performs DNS queries to domains with low reputation 149->191 signatures15 process16 dnsIp17 163 live.goatgame.live 104.21.70.98, 443, 49724 CLOUDFLARENETUS United States 47->163 165 172.67.222.125, 443, 49729 CLOUDFLARENETUS United States 47->165 167 192.168.2.1 unknown unknown 47->167 85 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 47->85 dropped 62 conhost.exe 47->62         started        64 cmd.exe 51->64         started        67 conhost.exe 51->67         started        217 Tries to harvest and steal browser information (history, passwords, etc) 53->217 169 requested404.com 63.250.33.126, 49725, 80 NAMECHEAP-NETUS United States 60->169 87 C:\Users\user\AppData\...\2rk_frt_rate_on.exe, PE32 60->87 dropped 89 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 60->89 dropped 91 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 60->91 dropped 93 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 60->93 dropped 69 2rk_frt_rate_on.exe 60->69         started        file18 signatures19 process20 dnsIp21 197 Obfuscated command line found 64->197 199 Uses ping.exe to sleep 64->199 72 Triste.exe.com 64->72         started        74 PING.EXE 64->74         started        77 findstr.exe 64->77         started        143 93.184.221.240 EDGECASTUS European Union 69->143 145 162.0.210.44 ACPCA Canada 69->145 201 Detected unpacking (overwrites its own PE header) 69->201 signatures22 process23 dnsIp24 80 Triste.exe.com 72->80         started        147 127.0.0.1 unknown unknown 74->147 113 C:\Users\user\AppData\...\Triste.exe.com, Targa 77->113 dropped file25 process26 dnsIp27 135 XvFGsHKHPpgkvS.XvFGsHKHPpgkvS 80->135 103 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 80->103 dropped 207 Injects a PE file into a foreign processes 80->207 file28 signatures29
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2021-07-27 11:54:42 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:29_7_6lk botnet:706 aspackv2 backdoor discovery evasion infostealer persistence spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Download via BitsAdmin
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Nirsoft
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE Generic Password Stealer User Agent Detected (RookIE)
suricata: ET MALWARE Observed Elysium Stealer Variant CnC Domain (all-brain-company .xyz in TLS SNI)
suricata: ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
http://readinglistforjuly1.xyz/
http://readinglistforjuly2.xyz/
http://readinglistforjuly3.xyz/
http://readinglistforjuly4.xyz/
http://readinglistforjuly5.xyz/
http://readinglistforjuly6.xyz/
http://readinglistforjuly7.xyz/
http://readinglistforjuly8.xyz/
http://readinglistforjuly9.xyz/
http://readinglistforjuly10.xyz/
http://readinglistforjuly1.site/
http://readinglistforjuly2.site/
http://readinglistforjuly3.site/
http://readinglistforjuly4.site/
http://readinglistforjuly5.site/
http://readinglistforjuly6.site/
http://readinglistforjuly7.site/
http://readinglistforjuly8.site/
http://readinglistforjuly9.site/
http://readinglistforjuly10.site/
http://readinglistforjuly1.club/
http://readinglistforjuly2.club/
http://readinglistforjuly3.club/
http://readinglistforjuly4.club/
http://readinglistforjuly5.club/
http://readinglistforjuly6.club/
http://readinglistforjuly7.club/
http://readinglistforjuly8.club/
http://readinglistforjuly9.club/
http://readinglistforjuly10.club/
https://shpak125.tumblr.com/
zertypelil.xyz:80
Unpacked files
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
82cd16bc052bcaed7531e22eb0a8fb13cb9de1fb61566614f44b9620d0626013
MD5 hash:
fcfcd017335d9e2fa20b4cba58cab370
SHA1 hash:
89a63a9f68936b954b376813cb99498877315ddf
SH256 hash:
0ae858eb82f575e12fff5cc2dd87f85a01dd285a6539b4173f4cab0a22788a9b
MD5 hash:
cd05a6c88e6ac5f44ce4880e5827b238
SHA1 hash:
4b73fc1df76100693eed62c08dbd3c96af449f87
SH256 hash:
c204948f88c6d384b39069c2c5c69ed62105ee73f391ff105b3e36081f12fc5d
MD5 hash:
cd8b4ea3aa92a0ed9eee929b3585c711
SHA1 hash:
da430a7a38bd3c7ad75ab6e9ed4a4ca6a077ac54
SH256 hash:
06bc58a57067d7ccc5c0c18433834073ad007a64f8148c21029b33aab4a98871
MD5 hash:
2e7ca69bf43b640d9ea65ea1ad14c06a
SHA1 hash:
a5d70424c5e05c50f154b7b8ff09961d7a465abb
SH256 hash:
50df788859ce3024e9018f60f7c04aa43c191de7b1578fdbebc7478898d5cd8d
MD5 hash:
9db9ef06359cce014baef96fa69b5a7c
SHA1 hash:
614c739b69be9a3914a9ca9548245ed2c97ceb63
SH256 hash:
bfebe04424e0a8621eb53d2d6da9d5c969e4b94e33ea532bb70e9212869ee9eb
MD5 hash:
28ddc420be08a62b8da803d14d0bcb93
SHA1 hash:
587ca5df9f7fdd3c6915f801f8cd15057342193f
SH256 hash:
6ea92579c10ff6128399ec8092b44388da56b89e83103797601d334d6c866ca0
MD5 hash:
f14bcba48fb3817154228ed4cf9df6cb
SHA1 hash:
26ae758142d6dd0d69d5f4ff127a0d9c633b6690
SH256 hash:
78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
MD5 hash:
c0d18a829910babf695b4fdaea21a047
SHA1 hash:
236a19746fe1a1063ebe077c8a0553566f92ef0f
SH256 hash:
e84c64295246e0add141567a22a289d922d58bb02755b27af176f9d8d7e833e5
MD5 hash:
907d694efe1d5b981e23b14caeec93aa
SHA1 hash:
230cc3171ce32035c21cad23491b9de878c363fb
SH256 hash:
8bd2bf1f43d15fd9abe36a6e6ba140f9d5109533151c97b4b8e85be7001d0d6d
MD5 hash:
f172f45e27da92fa2d7178a316cc837f
SHA1 hash:
cedd4a7c9426d50eec8dccfbfd2c2ec62247d635
SH256 hash:
6c75352bb8b43885d09e8003ac9e10f467ad152d0c9fee4c627c4ab6c583d049
MD5 hash:
674533f3514c139474739e4ff7f9836b
SHA1 hash:
bfc696ef41b1b6b924b1722ec54399cc74e66a37
SH256 hash:
2dd292dcc5d8e599d717242cb403360120308bed82e47709f6ae231202e1b0ff
MD5 hash:
a9049d13128ecd6f1f151527984028a7
SHA1 hash:
d4f4c653cb783792f1cf9a97cfadc1143e556edb
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments