MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f3cf6f156ce19666bd422299ae5a2055bc1f93dc1ed7330b7305668ef7b3cd5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 5 File information Comments

SHA256 hash: 2f3cf6f156ce19666bd422299ae5a2055bc1f93dc1ed7330b7305668ef7b3cd5
SHA3-384 hash: b01c7425ddaf3c0edbc2598ff9f50dc6f609d9e2082b8f17fd21947780b8cb4c2ef2a8b30d518bea303d77114809d387
SHA1 hash: aff4910dc3f7e8369026a0fa1ed8c26ade19c51f
MD5 hash: 3f77f23a8babf7876f8a21d9c3c5b18f
humanhash: whiskey-juliet-delaware-shade
File name:2F3CF6F156CE19666BD422299AE5A2055BC1F93DC1ED7.exe
Download: download sample
Signature RedLineStealer
File size:4'071'436 bytes
First seen:2022-02-06 18:31:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yFnBC5eRfpmTKBuAlFKdotj0Ip7znGPDXbl+owpifewDlFXXh7:yFnY2BVoij0IdDGbXTlRhXN
TLSH T1371633E420A4C0A7CAF30AF92670F79AD25E7267D66442F54BBDED9F74C8711630211B
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://178.79.161.18/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://178.79.161.18/ https://threatfox.abuse.ch/ioc/381450/
94.140.113.110:80 https://threatfox.abuse.ch/ioc/381451/

Intelligence


File Origin
# of uploads :
1
# of downloads :
230
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2F3CF6F156CE19666BD422299AE5A2055BC1F93DC1ED7.exe
Verdict:
No threats detected
Analysis date:
2022-02-06 18:55:22 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Creating a window
Reading critical registry keys
Sending an HTTP GET request
Sending an HTTP POST request
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys control.exe mokes overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader Socelars Vidar Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Creates HTML files with .exe extension (expired dropper behavior)
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: New RUN Key Pointing to Suspicious Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 567285 Sample: 2F3CF6F156CE19666BD422299AE... Startdate: 06/02/2022 Architecture: WINDOWS Score: 100 89 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->89 91 172.105.27.61 LINODE-APLinodeLLCUS United States 2->91 93 2 other IPs or domains 2->93 111 Malicious sample detected (through community Yara rule) 2->111 113 Antivirus detection for URL or domain 2->113 115 Antivirus detection for dropped file 2->115 117 16 other signatures 2->117 10 2F3CF6F156CE19666BD422299AE5A2055BC1F93DC1ED7.exe 10 2->10         started        13 svchost.exe 2->13         started        16 svchost.exe 2->16         started        18 6 other processes 2->18 signatures3 process4 file5 87 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->87 dropped 20 setup_installer.exe 8 10->20         started        137 Changes security center settings (notifications, updates, antivirus, firewall) 13->137 signatures6 process7 file8 53 C:\Users\user\AppData\...\setup_install.exe, PE32 20->53 dropped 55 C:\Users\user\AppData\...\libwinpthread-1.dll, PE32 20->55 dropped 57 C:\Users\user\AppData\...\libstdc++-6.dll, PE32 20->57 dropped 59 3 other files (none is malicious) 20->59 dropped 119 Antivirus detection for dropped file 20->119 24 setup_install.exe 10 20->24         started        signatures9 process10 dnsIp11 109 127.0.0.1 unknown unknown 24->109 79 C:\Users\user\AppData\...\e0af9ba433.exe, PE32+ 24->79 dropped 81 C:\Users\user\AppData\...\98bd47a5702792.exe, PE32 24->81 dropped 83 C:\Users\user\AppData\...\6548f8299a79.exe, PE32 24->83 dropped 85 6 other malicious files 24->85 dropped 28 cmd.exe 24->28         started        30 cmd.exe 1 24->30         started        32 cmd.exe 24->32         started        34 7 other processes 24->34 file12 process13 process14 36 4d3eaac657427.exe 28->36         started        41 3c5f757214.exe 30->41         started        43 19acf0b0fe5.exe 32->43         started        45 48c1763b22721.exe 44 34->45         started        47 1186a6b7e31648.exe 34->47         started        49 98bd47a5702792.exe 14 2 34->49         started        51 2 other processes 34->51 dnsIp15 95 37.0.11.8 WKD-ASIE Netherlands 36->95 97 37.0.8.235 WKD-ASIE Netherlands 36->97 103 14 other IPs or domains 36->103 61 C:\Users\...\zJBCQdrmJLUMYKIaiASLBJLo.exe, PE32 36->61 dropped 63 C:\Users\...\wst1eUdCEnJUUZDC_HNlJxU8.exe, PE32 36->63 dropped 65 C:\Users\...\sC3ehs1YIhc0K9KqS9Ovtugv.exe, PE32+ 36->65 dropped 77 28 other malicious files 36->77 dropped 121 Antivirus detection for dropped file 36->121 123 Drops PE files to the document folder of the user 36->123 125 Creates HTML files with .exe extension (expired dropper behavior) 36->125 127 Disable Windows Defender real time protection (registry) 36->127 67 C:\Users\user\AppData\Local\Temp\setup.exe, PE32 41->67 dropped 69 C:\Users\user\AppData\Local\...\chrome2.exe, PE32+ 41->69 dropped 71 C:\Users\user\AppData\...\3c5f757214.exe.log, ASCII 41->71 dropped 129 Multi AV Scanner detection for dropped file 41->129 131 Machine Learning detection for dropped file 41->131 73 C:\Users\user\AppData\Local\...\BUILD1~1.EXE, PE32 43->73 dropped 75 C:\Users\user\AppData\Local\Temp\...\1cr.exe, PE32 43->75 dropped 105 2 other IPs or domains 45->105 133 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 45->133 135 Tries to harvest and steal browser information (history, passwords, etc) 45->135 99 148.251.234.83 HETZNER-ASDE Germany 47->99 101 162.159.134.233 CLOUDFLARENETUS United States 49->101 107 2 other IPs or domains 51->107 file16 signatures17
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2021-08-10 07:38:07 UTC
File Type:
PE (Exe)
Extracted files:
362
AV detection:
31 of 43 (72.09%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:onlylogger family:redline family:smokeloader family:vidar botnet:706 botnet:build1 botnet:top aspackv2 backdoor evasion infostealer loader persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
OnlyLogger Payload
Vidar Stealer
Amadey
Modifies Windows Defender Real-time Protection settings
OnlyLogger
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
Malware Config
C2 Extraction:
2.56.59.26/dima/index.php
jainestaynor.xyz:80
45.142.213.135:30058
https://prophefliloc.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
Unpacked files
SH256 hash:
76fd57122331c7e402c7ab4a48bb9a86529641200f391241e20f31232e5f439b
MD5 hash:
922068b48ff8abb7e513a724443c1f62
SHA1 hash:
fef5db5322dae45dade837d28a2ad1aa159c74b9
SH256 hash:
0cfeb696a1e79a5933429e77f1d32b5d95fafbbd7053955a7ade9c0de264a904
MD5 hash:
2354ad9552eb7a2b129b6397be8fdcf1
SHA1 hash:
20218e9b1dc221230e279cdc1e33e012d38a7aeb
SH256 hash:
3b319a1cd50e4d9aef00f9ada5664b837c8310ee6499980a4b54050f2dbc6377
MD5 hash:
b7b6f7a5f6ddd6f1ee3a5b7f446a3da2
SHA1 hash:
f2015fd09251b66deaa5a0d9e1ca8c24ebaec229
SH256 hash:
1cdddf182f161ab789edfcc68a0706d0b8412a9ba67a3f918fe60fab270eabff
MD5 hash:
0965da18bfbf19bafb1c414882e19081
SHA1 hash:
e4556bac206f74d3a3d3f637e594507c30707240
SH256 hash:
78958d664b1c140f2b45e56c4706108eeb5f14756977e2efd3409f8a788d3c98
MD5 hash:
c0d18a829910babf695b4fdaea21a047
SHA1 hash:
236a19746fe1a1063ebe077c8a0553566f92ef0f
SH256 hash:
17a09218d7626f1fc6b39a27e233743eaa6a404d01df998fa9df29c7b06a4674
MD5 hash:
6082a0ae46e951178752029cb7be5c94
SHA1 hash:
005c541a92bf28ce6fd737250f68eaeca8abd1d0
SH256 hash:
37342babfd23ab30837a55886012a5125c69d2e5f883dadfc06a42cfb28e5b34
MD5 hash:
3f9f7dfccefb41726d6b99e434155467
SHA1 hash:
f5a7b26fb2aa6ebb7177b30b24a7fdbc067de8f1
SH256 hash:
1a98511e30ec0a149225550e8334812ae0d1c380a3c3870b0a62fe0c77ff7705
MD5 hash:
97a711a210638f23541f7466b2b7d7a5
SHA1 hash:
7e5bec92f5049f04713b2bd9a7fbaa94d7c99b95
SH256 hash:
20d3cfaa99d4e6834f19364eb59539120283c2278c1ae4f7438ad037b1a1fc5b
MD5 hash:
36edb5ecb7c43f751b233b8fd871db47
SHA1 hash:
6c5cebe3c56070e74c4d1e757361b5db027909c1
SH256 hash:
23ff7422ce8898bd6dc3be3468e35d37b246f5d8bc24377bef57596d5db230a7
MD5 hash:
9c7adb50a62026b88d9469fc2d9404d9
SHA1 hash:
49cc1e75e541f77482e339859d1b17b53b9c188b
SH256 hash:
25cbb640dc9e92cba98cbf620464c217c5895c2cac49b8f8f94d46944fc5614c
MD5 hash:
7031475de6cf8a264ca68211e18b456c
SHA1 hash:
2d053a256d04d27badaad17ee7e562e7d54674ee
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
fe1bdd45cb519cddad1e330ebeb4e0f6bfc0f73a26c4f3869cd214a62346dd82
MD5 hash:
023c782bdc5edbbd438af7c9def2ebde
SHA1 hash:
f0e27b7dbc44f74ffb9502baf7093b04b65a09d9
SH256 hash:
2f3cf6f156ce19666bd422299ae5a2055bc1f93dc1ed7330b7305668ef7b3cd5
MD5 hash:
3f77f23a8babf7876f8a21d9c3c5b18f
SHA1 hash:
aff4910dc3f7e8369026a0fa1ed8c26ade19c51f
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments