MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 39c748040f01c934c73c23f4612cb33a0846219d8dd7ba3e0adbbc9d047027e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 3 File information Comments

SHA256 hash: 39c748040f01c934c73c23f4612cb33a0846219d8dd7ba3e0adbbc9d047027e4
SHA3-384 hash: 6aa95082519755e2325bae0412afd539a24f6c71250eceeaba59b7fabfd86f8a1b6a220a4e6068d360e41fd451da2b63
SHA1 hash: 9a0e334e45421834734c4a226941cf410f5b7340
MD5 hash: 4f460f61a71327c6b22bf71394e3beb0
humanhash: failed-uranus-connecticut-five
File name:39C748040F01C934C73C23F4612CB33A0846219D8DD7B.exe
Download: download sample
Signature RedLineStealer
File size:5'229'056 bytes
First seen:2023-02-03 21:45:24 UTC
Last seen:2023-02-03 23:32:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b0a438491df559e2ae875aca71787ff8 (4 x RedLineStealer, 1 x Amadey, 1 x Smoke Loader)
ssdeep 98304:r2hN+VqOJSrzvSgur5lLSlLduBp9OGmzogX3tefN+tJGrLPSYU9U42TjczbqTI:6hoVqO4nm59iun9z2te0qHaYU9U46jeL
Threatray 147 similar samples on MalwareBazaar
TLSH T15C36232312A42087C5E4D0398837BDE8B3F69E7B4681A876F4B1F9C11A759F096C3E57
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4505/5/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 92e0614949e1f843 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
62.204.41.170:4179

Intelligence


File Origin
# of uploads :
2
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
39C748040F01C934C73C23F4612CB33A0846219D8DD7B.exe
Verdict:
Malicious activity
Analysis date:
2023-02-03 21:48:18 UTC
Tags:
evasion opendir trojan rat redline loader gcleaner

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
Replacing files
DNS request
Sending an HTTP GET request
Launching a service
Launching a process
Sending a custom TCP request
Reading critical registry keys
Sending a UDP request
Creating a file
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Creating a window
Blocking the Windows Defender launch
Query of malicious DNS domain
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
arkei packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, PrivateLoader,
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the document folder of the user
Drops PE files with benign system names
Found C&C like URL pattern
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found Tor onion address
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected PrivateLoader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 798328 Sample: 39C748040F01C934C73C23F4612... Startdate: 03/02/2023 Architecture: WINDOWS Score: 100 132 www.k9designstudio.com 2->132 134 www.isurucabs.lk 2->134 136 37 other IPs or domains 2->136 160 Snort IDS alert for network traffic 2->160 162 Malicious sample detected (through community Yara rule) 2->162 164 Antivirus detection for URL or domain 2->164 166 24 other signatures 2->166 11 39C748040F01C934C73C23F4612CB33A0846219D8DD7B.exe 10 42 2->11         started        signatures3 process4 dnsIp5 138 208.67.104.60, 49716, 80 GRAYSON-COLLIN-COMMUNICATIONSUS United States 11->138 140 meta-zone-1.ru 31.31.196.244, 49711, 49712, 49713 AS-REGRU Russian Federation 11->140 142 18 other IPs or domains 11->142 94 C:\Users\...\wnxYUAHOPDh4QdFp1DeJeVGl.exe, PE32 11->94 dropped 96 C:\Users\...\XwF0D7lklkRhhfVyMR_ixhbU.exe, PE32 11->96 dropped 98 C:\Users\...\Xk7Eu2tjhjqUQy2qX3XZxq8s.exe, PE32 11->98 dropped 100 13 other malicious files 11->100 dropped 176 May check the online IP address of the machine 11->176 178 Creates HTML files with .exe extension (expired dropper behavior) 11->178 180 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 11->180 182 3 other signatures 11->182 16 6WcrvcYCkydy6CTneQ0O91Mt.exe 18 11->16         started        20 Xk7Eu2tjhjqUQy2qX3XZxq8s.exe 6 11->20         started        22 XwF0D7lklkRhhfVyMR_ixhbU.exe 2 11->22         started        24 6 other processes 11->24 file6 signatures7 process8 dnsIp9 120 23.254.227.214 HOSTWINDSUS United States 16->120 122 telegram.org 149.154.167.99 TELEGRAMRU United Kingdom 16->122 124 ipinfo.io 16->124 76 C:\Users\...\vVumzF_wAFifmmIeIyYUF2Ta.exe, PE32 16->76 dropped 78 C:\Users\user\AppData\Local\...\WWW14[1].bmp, PE32 16->78 dropped 80 C:\...\PowerControl_Svc.exe, PE32 16->80 dropped 27 vVumzF_wAFifmmIeIyYUF2Ta.exe 16->27         started        82 C:\Windows\Temp\321.exe, PE32 20->82 dropped 84 C:\Windows\Temp\123.exe, PE32 20->84 dropped 32 321.exe 20->32         started        34 123.exe 20->34         started        86 C:\Users\...\XwF0D7lklkRhhfVyMR_ixhbU.tmp, PE32 22->86 dropped 36 XwF0D7lklkRhhfVyMR_ixhbU.tmp 22->36         started        126 siaoheg.aappatey.com 45.66.159.142 ENZUINC-US Russian Federation 24->126 128 iueg.aappatey.com 24->128 130 3 other IPs or domains 24->130 88 C:\Users\user\AppData\Local\...\Install.exe, PE32 24->88 dropped 168 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 24->168 170 Query firmware table information (likely to detect VMs) 24->170 172 Tries to harvest and steal browser information (history, passwords, etc) 24->172 174 Hides threads from debuggers 24->174 38 Install.exe 24->38         started        40 RSYYlXTNgmYumBzDT9UZATVJ.exe 24->40         started        42 explorer.exe 24->42 injected file10 signatures11 process12 dnsIp13 144 n8w5.c12.e2-1.dev 27->144 146 87.240.129.133 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 27->146 148 15 other IPs or domains 27->148 102 C:\Users\...\wUrFBcGeTjJfsiOg3MUoIs6a.exe, PE32 27->102 dropped 104 C:\Users\...\uTPGj6eLFv29999FsZGti68P.exe, PE32 27->104 dropped 106 C:\Users\...\sZIcNR2N8zwJflR0foLCzgp1.exe, PE32+ 27->106 dropped 116 16 other malicious files 27->116 dropped 184 Multi AV Scanner detection for dropped file 27->184 186 May check the online IP address of the machine 27->186 188 Creates HTML files with .exe extension (expired dropper behavior) 27->188 196 3 other signatures 27->196 190 Writes to foreign memory regions 32->190 192 Allocates memory in foreign processes 32->192 194 Injects a PE file into a foreign processes 32->194 44 vbc.exe 32->44         started        48 conhost.exe 32->48         started        50 WerFault.exe 32->50         started        52 conhost.exe 34->52         started        54 vbc.exe 34->54         started        56 WerFault.exe 34->56         started        108 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 36->108 dropped 110 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 36->110 dropped 118 7 other files (6 malicious) 36->118 dropped 58 finalrecovery.exe 36->58         started        112 C:\Users\user\AppData\Local\...\Install.exe, PE32 38->112 dropped 61 Install.exe 38->61         started        114 C:\Windows\rss\csrss.exe, PE32 40->114 dropped file14 signatures15 process16 dnsIp17 150 65.21.213.208 CP-ASDE United States 44->150 198 Tries to harvest and steal browser information (history, passwords, etc) 44->198 63 cmd.exe 44->63         started        152 45.12.253.56 CMCSUS Germany 58->152 154 45.12.253.72 CMCSUS Germany 58->154 156 45.12.253.75 CMCSUS Germany 58->156 90 C:\Users\user\AppData\...\ZnTmPoRbx3kO.exe, PE32 58->90 dropped 65 ZnTmPoRbx3kO.exe 58->65         started        92 C:\Users\user\AppData\Local\...\gdMZVcs.exe, PE32 61->92 dropped 200 Multi AV Scanner detection for dropped file 61->200 68 forfiles.exe 61->68         started        70 forfiles.exe 61->70         started        file18 signatures19 process20 signatures21 72 conhost.exe 63->72         started        158 Multi AV Scanner detection for dropped file 65->158 74 conhost.exe 68->74         started        process22
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2022-12-19 14:22:12 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
26 of 38 (68.42%)
Threat level:
  5/5
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader loader spyware stealer vmprotect
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
VMProtect packed file
PrivateLoader
Unpacked files
SH256 hash:
39c748040f01c934c73c23f4612cb33a0846219d8dd7ba3e0adbbc9d047027e4
MD5 hash:
4f460f61a71327c6b22bf71394e3beb0
SHA1 hash:
9a0e334e45421834734c4a226941cf410f5b7340
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments