MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3065fb0aa4e0c395a18ba4c45e69282cc3eff4d95809a1ae6dcd51e48c2b9811. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs 3 YARA 13 File information Comments

SHA256 hash: 3065fb0aa4e0c395a18ba4c45e69282cc3eff4d95809a1ae6dcd51e48c2b9811
SHA3-384 hash: f8e1baa079dd50acfcb3d414d104375a53c67c239546f0a229acadef0bd529322a85bc82e20a8abbd511385c671a60d1
SHA1 hash: bb5c7c656b0e162a3d62e9742218f12dfcd2d61a
MD5 hash: 5637aba8fa47476f92deb742b91a2099
humanhash: queen-lima-hotel-eight
File name:5637ABA8FA47476F92DEB742B91A2099.exe
Download: download sample
Signature RedLineStealer
File size:2'774'371 bytes
First seen:2021-07-15 17:15:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBaPkZVi7iKiF8cUvFyPt/eQHEpTdeFqfOKOmFrpGSro5EwJ84vLRaBtIl9mT5V:xcri7ixZUvFyPd89MFqfBrpGSvCvLUBB
Threatray 162 similar samples on MalwareBazaar
TLSH T1D9D533603BE5C4FBF266583495483FB6B2BAD7980B104CCBB784E64C4F2C4A5D11B5AE
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
86.106.181.209:58703

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
86.106.181.209:58703 https://threatfox.abuse.ch/ioc/160592/
79.141.165.169:80 https://threatfox.abuse.ch/ioc/160635/
193.110.3.6:80 https://threatfox.abuse.ch/ioc/160649/

Intelligence


File Origin
# of uploads :
1
# of downloads :
176
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
5637ABA8FA47476F92DEB742B91A2099.exe
Verdict:
No threats detected
Analysis date:
2021-07-15 17:16:16 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer Cookie Stealer RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Renames NTDLL to bypass HIPS
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Backstage Stealer
Yara detected Cookie Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 449496 Sample: xSdXan6nb2.exe Startdate: 15/07/2021 Architecture: WINDOWS Score: 100 121 google.vrthcobj.com 2->121 157 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->157 159 Found malware configuration 2->159 161 Antivirus detection for URL or domain 2->161 163 13 other signatures 2->163 11 xSdXan6nb2.exe 15 2->11         started        signatures3 process4 file5 95 C:\Users\user\AppData\...\setup_install.exe, PE32 11->95 dropped 97 C:\Users\user\AppData\Local\...\sonia_7.txt, PE32 11->97 dropped 99 C:\Users\user\AppData\Local\...\sonia_6.txt, PE32 11->99 dropped 101 10 other files (none is malicious) 11->101 dropped 14 setup_install.exe 1 11->14         started        process6 dnsIp7 137 sokiran.xyz 104.21.19.133, 49744, 80 CLOUDFLARENETUS United States 14->137 139 127.0.0.1 unknown unknown 14->139 141 192.168.2.1 unknown unknown 14->141 197 Detected unpacking (changes PE section rights) 14->197 199 Performs DNS queries to domains with low reputation 14->199 18 cmd.exe 1 14->18         started        20 cmd.exe 1 14->20         started        22 cmd.exe 1 14->22         started        24 5 other processes 14->24 signatures8 process9 process10 26 sonia_2.exe 1 18->26         started        30 sonia_5.exe 15 8 20->30         started        33 sonia_1.exe 2 22->33         started        35 sonia_7.exe 24->35         started        37 sonia_6.exe 24->37         started        39 sonia_4.exe 1 19 24->39         started        41 sonia_3.exe 12 24->41         started        dnsIp11 77 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 26->77 dropped 165 DLL reload attack detected 26->165 167 Detected unpacking (changes PE section rights) 26->167 169 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 26->169 183 4 other signatures 26->183 43 explorer.exe 26->43 injected 151 2 other IPs or domains 30->151 79 C:\Users\user\AppData\Roaming\7707674.exe, PE32 30->79 dropped 81 C:\Users\user\AppData\Roaming\5168997.exe, PE32 30->81 dropped 83 C:\Users\user\AppData\Roaming\3276383.exe, PE32 30->83 dropped 85 C:\Users\user\AppData\Roaming\2377178.exe, PE32 30->85 dropped 48 7707674.exe 30->48         started        50 2377178.exe 30->50         started        52 3276383.exe 30->52         started        54 5168997.exe 30->54         started        171 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 33->171 173 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 33->173 175 Creates processes via WMI 33->175 56 sonia_1.exe 5 33->56         started        143 176.111.174.254 WILWAWPL Russian Federation 35->143 177 Detected unpacking (overwrites its own PE header) 35->177 145 37.0.11.41, 49752, 80 WKD-ASIE Netherlands 37->145 153 2 other IPs or domains 37->153 179 May check the online IP address of the machine 37->179 181 Disable Windows Defender real time protection (registry) 37->181 147 ip-api.com 208.95.112.1, 49751, 80 TUT-ASUS United States 39->147 155 4 other IPs or domains 39->155 87 C:\Users\user\Pictures\background.png, DOS 39->87 dropped 89 C:\Users\user\AppData\Local\Temp\22222.exe, PE32 39->89 dropped 91 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 39->91 dropped 93 C:\Users\user\AppData\Local\...\aaa[1].dll, DOS 39->93 dropped 58 11111.exe 39->58         started        62 2 other processes 39->62 149 sergeevih43.tumblr.com 74.114.154.22, 443, 49749 AUTOMATTICUS Canada 41->149 60 WerFault.exe 41->60         started        file12 signatures13 process14 dnsIp15 125 118.33.109.122 KIXS-AS-KRKoreaTelecomKR Korea Republic of 43->125 127 181.129.180.251 EPMTelecomunicacionesSAESPCO Colombia 43->127 103 C:\Users\user\AppData\Roaming\jfffieh, PE32 43->103 dropped 185 Benign windows process drops PE files 43->185 187 Hides that the sample has been downloaded from the Internet (zone.identifier) 43->187 64 WinHoster.exe 43->64         started        66 WinHoster.exe 43->66         started        129 79.141.165.169 HZ-NL-ASGB Bulgaria 48->129 131 172.67.75.172 CLOUDFLARENETUS United States 48->131 189 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 48->189 191 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 48->191 193 Tries to harvest and steal browser information (history, passwords, etc) 48->193 195 2 other signatures 48->195 133 172.67.190.51 CLOUDFLARENETUS United States 50->133 105 C:\ProgramData\60\vcruntime140.dll, PE32 50->105 dropped 107 C:\ProgramData\60\sqlite3.dll, PE32 50->107 dropped 117 5 other files (none is malicious) 50->117 dropped 68 WerFault.exe 50->68         started        135 104.21.87.184 CLOUDFLARENETUS United States 52->135 119 7 other files (none is malicious) 52->119 dropped 71 WerFault.exe 52->71         started        109 C:\Users\user\AppData\...\WinHoster.exe, PE32 54->109 dropped 73 WinHoster.exe 54->73         started        111 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 56->111 dropped 113 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 56->113 dropped 115 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 56->115 dropped 75 conhost.exe 56->75         started        file16 signatures17 process18 dnsIp19 123 104.43.139.144 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 68->123
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-07-13 12:05:58 UTC
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:redline family:smokeloader family:vidar botnet:865 botnet:903 botnet:933 botnet:cana aspackv2 backdoor dropper evasion infostealer loader persistence stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Nirsoft
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
https://sergeevih43.tumblr.com/
176.111.174.254:56328
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
https://sslamlssa1.tumblr.com/
Unpacked files
SH256 hash:
aa6cc42ad1c627460a4c54cfa46fa1934518c510d2bdb323ee119c460136ed3f
MD5 hash:
f2eb93b3bbe3cad8a4b76e74ffd3ccff
SHA1 hash:
e018afa2e24e5eb03598d37d9142674ad1d7ac2f
SH256 hash:
7296d60423fbfc4877e7bbb0c1352d0756908f9fbc53679bce463320e3a382f0
MD5 hash:
7ca1af0d05d832e6039ddb2629c6007f
SHA1 hash:
b3cf5b027fa6ee5a6cebb33bde0b36eb17e9956c
SH256 hash:
8c7cdb6916702d2387737927da9a3c49a6f4c1033545c1ed9bb37fc2829e4803
MD5 hash:
dca556c5c11a934a767c12ac44f179e5
SHA1 hash:
900f5ad3481cdb4f82dccf97d0b7ab272e599dce
SH256 hash:
2db0547473a3af661d1ec84c56dd5ecba643ec4cffc8802c21abc21312bd44ce
MD5 hash:
ec15c930461f96b607f85b4652d409de
SHA1 hash:
3d3ff335b8c3a5f298a6d5b6252e95aa9d70e794
SH256 hash:
10f84007d2743fcd12283e4564078edbe00a611dd2141f8b67dba2b7134ed114
MD5 hash:
28d655c1d798217541e138e51ba1e31e
SHA1 hash:
13338144195fe89794c13d55b4c3b1f201b168cd
SH256 hash:
2c511d8e8e2330bab9c00df609a8197deb32e36943c023b4d87de387e42cb94a
MD5 hash:
b2fd5e3d293e5c8df255a228e39b8be0
SHA1 hash:
ed7bc19526f186228adcfa2a3a85244c4d01287d
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
cd32c89038ba3b5a19e5ec73584bea9237b14bdf0d6c8d465cf61f59c13ad580
MD5 hash:
d22318b9192cd91978a4767649102ba8
SHA1 hash:
c71dcd9eb338558879f43db107ee3b5d56f03489
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
959b21542215b93dafb6df217039027b81bf0954de1c2ae08f9c68ef6cad526e
MD5 hash:
503702e08c6aa1f3ff5d1136be1d984b
SHA1 hash:
5ef3a7e0518a08f10cebbdb70ed6c833f939fafe
SH256 hash:
7011194e88532367c5def790dd53d05f662520fb480f4b092b88e1818c22e7d6
MD5 hash:
41a5069d40089281b8ed5f6df8d776c6
SHA1 hash:
3c7e43a8ee47aee6474231f35a20f442ca61e1ce
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
87a61772169fe57843545e011ec8f733e9af49c13098a545c7452af52e6e06cc
MD5 hash:
b88e13309d5cffbfc2db0fe86fa9307a
SHA1 hash:
87f7a80ad766f0cb054ac3cd2630963ae7be2e72
SH256 hash:
3065fb0aa4e0c395a18ba4c45e69282cc3eff4d95809a1ae6dcd51e48c2b9811
MD5 hash:
5637aba8fa47476f92deb742b91a2099
SHA1 hash:
bb5c7c656b0e162a3d62e9742218f12dfcd2d61a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICOIUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Detects Raccoon/Racealer infostealer
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments