MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2f4401237b1c8fb0fd9caf31e280f73dadeaac62e837f30ed0b580d42d75d899. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments

SHA256 hash: 2f4401237b1c8fb0fd9caf31e280f73dadeaac62e837f30ed0b580d42d75d899
SHA3-384 hash: 92c07c51ba361452bd9e57298514118be695883879f543fcd640bb88bc98923179747161da3a875a8b8dc445268972c8
SHA1 hash: 5af979f056fc5c5946e6a1f29ed3d3e98e3a7b10
MD5 hash: 8e8bc276826ac0ba44a346f353f462f7
humanhash: bakerloo-grey-papa-cola
File name:2F4401237B1C8FB0FD9CAF31E280F73DADEAAC62E837F.exe
Download: download sample
Signature RedLineStealer
File size:322'048 bytes
First seen:2022-01-24 13:15:36 UTC
Last seen:2022-01-24 14:46:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e8c238b864f7b42d074feea3c8efffa3 (2 x CoinMiner, 2 x RedLineStealer, 1 x TeamBot)
ssdeep 6144:3Ar065ojBm5VMG8TaN+jSXuZet0ygw2AP2AckXIm:fjo/MG8Ta0jSXuZet0ygw2yck4m
Threatray 6'784 similar samples on MalwareBazaar
TLSH T101647C11A7A0CC35F5F746B889BDA3A8EB3F79A16B2490CB52D536EA46346D0DC30317
File icon (PE):PE icon
dhash icon 5012b0e068696c46 (8 x RaccoonStealer, 8 x RedLineStealer, 6 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
95.216.21.217:20158

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
95.216.21.217:20158 https://threatfox.abuse.ch/ioc/315658/

Intelligence


File Origin
# of uploads :
2
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-11-28 07:12:11 UTC
Tags:
trojan rat redline loader evasion opendir stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
DNS request
Sending a custom TCP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Query of malicious DNS domain
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
coinminer glupteba packed smokeloader
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Remote Thread Created
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 558809 Sample: 2F4401237B1C8FB0FD9CAF31E28... Startdate: 24/01/2022 Architecture: WINDOWS Score: 100 32 Multi AV Scanner detection for domain / URL 2->32 34 Found malware configuration 2->34 36 Antivirus / Scanner detection for submitted sample 2->36 38 5 other signatures 2->38 7 2F4401237B1C8FB0FD9CAF31E280F73DADEAAC62E837F.exe 2->7         started        10 tbfswhh 2->10         started        process3 signatures4 48 Contains functionality to inject code into remote processes 7->48 50 Injects a PE file into a foreign processes 7->50 12 2F4401237B1C8FB0FD9CAF31E280F73DADEAAC62E837F.exe 7->12         started        52 Antivirus detection for dropped file 10->52 54 Multi AV Scanner detection for dropped file 10->54 56 Machine Learning detection for dropped file 10->56 15 tbfswhh 10->15         started        process5 signatures6 58 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 12->58 60 Maps a DLL or memory area into another process 12->60 62 Checks if the current machine is a virtual machine (disk enumeration) 12->62 17 explorer.exe 2 12->17 injected 64 Creates a thread in another existing process (thread injection) 15->64 process7 dnsIp8 26 file-coin-host-12.com 17->26 28 host-data-coin-11.com 34.94.211.117, 49752, 80 GOOGLEUS United States 17->28 30 192.168.2.1 unknown unknown 17->30 22 C:\Users\user\AppData\Roaming\tbfswhh, PE32 17->22 dropped 24 C:\Users\user\...\tbfswhh:Zone.Identifier, ASCII 17->24 dropped 40 System process connects to network (likely due to code injection or exploit) 17->40 42 Benign windows process drops PE files 17->42 44 Deletes itself after installation 17->44 46 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->46 file9 signatures10
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2021-11-28 11:07:12 UTC
File Type:
PE (Exe)
Extracted files:
14
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
SmokeLoader
Malware Config
C2 Extraction:
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments