MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3bd622b55a64a74a2452fc882cd26f3adef86400b4d4000aed0791682dd43a25. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 2 File information Comments

SHA256 hash: 3bd622b55a64a74a2452fc882cd26f3adef86400b4d4000aed0791682dd43a25
SHA3-384 hash: 0907fc29c1d34aecdf8fce4ff6e157a8e24523b57ca0ed25022d5f4d3e1d1eaa9a1c2a16e4d72e34185de34734e970be
SHA1 hash: 64e661c1fadf7e0642c03792f49df01f8426429a
MD5 hash: ae8c84fa162ade0523a8f791c3203854
humanhash: oven-oven-cola-william
File name:ae8c84fa162ade0523a8f791c3203854.exe
Download: download sample
Signature RedLineStealer
File size:849'824 bytes
First seen:2022-08-29 04:50:32 UTC
Last seen:2022-08-29 05:29:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 48c28d9f3783f0e32815b0b4c57a60a9 (73 x RecordBreaker, 23 x RedLineStealer, 21 x ArkeiStealer)
ssdeep 24576:HyX+MN48Zz/YIry++gaZRlWR6jsAqO5y7k:Yz/YIrq1sY
TLSH T1E0058D313DC4C172EDE220B646ECFA31467DE0B0072647CB56C85BEEE6606D16F32A96
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
78.153.144.6:2510

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
78.153.144.6:2510 https://threatfox.abuse.ch/ioc/845912/

Intelligence


File Origin
# of uploads :
2
# of downloads :
316
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ae8c84fa162ade0523a8f791c3203854.exe
Verdict:
No threats detected
Analysis date:
2022-08-29 04:54:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckNumberOfProcessor
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware mokes overlay packed wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon Stealer v2, RedLine, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 692014 Sample: vE0L2ENy5h.exe Startdate: 29/08/2022 Architecture: WINDOWS Score: 100 88 coinsurf.com 2->88 90 ultra-cheat.ru.net 2->90 92 in.appcenter.ms 2->92 116 Snort IDS alert for network traffic 2->116 118 Malicious sample detected (through community Yara rule) 2->118 120 Antivirus detection for URL or domain 2->120 122 9 other signatures 2->122 12 vE0L2ENy5h.exe 2->12         started        15 ehigjsb 2->15         started        signatures3 process4 signatures5 138 Contains functionality to inject code into remote processes 12->138 140 Writes to foreign memory regions 12->140 142 Allocates memory in foreign processes 12->142 144 Injects a PE file into a foreign processes 12->144 17 AppLaunch.exe 12->17         started        20 WerFault.exe 23 9 12->20         started        23 WerFault.exe 12->23         started        process6 file7 108 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 17->108 110 Maps a DLL or memory area into another process 17->110 112 Checks if the current machine is a virtual machine (disk enumeration) 17->112 114 Creates a thread in another existing process (thread injection) 17->114 25 explorer.exe 12 17->25 injected 66 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 20->66 dropped signatures8 process9 dnsIp10 102 belladama.fr 207.174.214.200, 443, 49740, 49743 PUBLIC-DOMAIN-REGISTRYUS United States 25->102 104 ilab8snah5ysh.top 194.87.94.240, 49726, 49727, 49731 MTW-ASRU Russian Federation 25->104 106 8 other IPs or domains 25->106 78 C:\Users\user\AppData\Roaming\ehigjsb, PE32 25->78 dropped 80 C:\Users\user\AppData\Local\TempF9.exe, PE32 25->80 dropped 82 C:\Users\user\AppData\Local\Temp\D4BD.exe, PE32 25->82 dropped 84 3 other files (2 malicious) 25->84 dropped 130 System process connects to network (likely due to code injection or exploit) 25->130 132 Benign windows process drops PE files 25->132 134 Performs DNS queries to domains with low reputation 25->134 136 3 other signatures 25->136 30 BF7E.exe 25->30         started        33 EF9.exe 25->33         started        35 D4BD.exe 25->35         started        37 6 other processes 25->37 file11 signatures12 process13 file14 146 Machine Learning detection for dropped file 30->146 40 AppLaunch.exe 30->40         started        45 WerFault.exe 30->45         started        148 Writes to foreign memory regions 33->148 150 Allocates memory in foreign processes 33->150 152 Injects a PE file into a foreign processes 33->152 47 AppLaunch.exe 33->47         started        49 AppLaunch.exe 35->49         started        51 WerFault.exe 35->51         started        68 C:\Users\user\AppData\Local\...\Update.exe, PE32 37->68 dropped 154 Multi AV Scanner detection for dropped file 37->154 53 Update.exe 7 37->53         started        55 AppLaunch.exe 37->55         started        57 WerFault.exe 37->57         started        signatures15 process16 dnsIp17 94 t.me 149.154.167.99, 443, 49744 TELEGRAMRU United Kingdom 40->94 96 transfer.sh 144.76.136.153, 443, 49756 HETZNER-ASDE Germany 40->96 98 49.12.72.35, 49745, 80 HETZNER-ASDE Germany 40->98 70 C:\ProgramData\52651860018805980373.exe, PE32 40->70 dropped 124 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 40->124 126 Tries to harvest and steal browser information (history, passwords, etc) 40->126 128 Tries to steal Crypto Currency Wallets 40->128 59 52651860018805980373.exe 40->59         started        62 cmd.exe 40->62         started        72 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 45->72 dropped 100 46.249.58.152, 49760, 80 SERVERIUS-ASNL Netherlands 47->100 74 C:\Users\user\AppData\LocalLow\nss3.dll, PE32 47->74 dropped 76 C:\Users\user\AppData\Local\...\Update.exe, PE32 53->76 dropped file18 signatures19 process20 file21 86 C:\Users\user\AppData\Local\Temp\...\work.exe, PE32 59->86 dropped 64 conhost.exe 62->64         started        process22
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2022-08-29 04:51:07 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
418d8547b63eccc2a97bc8b281c9b07cc6f5953d6b6424483595fefb14268867
MD5 hash:
f4e3c05647e8e2286ce66a4d8a442ed2
SHA1 hash:
6e3e8d1182bf6b3d396183c5cb1ee8bc76cfd4c9
Detections:
win_smokeloader_a2
Parent samples :
b5aedf88db5ca22f172a80f49264d768d19c0481e12ffd1b653ed01a2d6be104
3b5adc36b8fd04b224008a8b2fc3770532115de8973d21a0f8b3226df887c1d4
7fd6ca38752917a128110b73a95e598f823b59ad272f69fed37a6cc51919fe22
f88f894dac9ff490c6814df230381e0ec6a4a530ee701a275c7d71216ce28fdf
45ef26c608cac927535d8b6372782c09a6455184c16fa46475245fff49aaf8a8
2c440478968af666a120debc6d82a54a731ba91ac3f9b160eb356c9b52104609
cc0be8927a70eb065fc069c07204c32898074038a52cb3a689f0044d03ec0804
5b6092b1e5a7c5fd607eb7fcd5a4ae3209348893f24a38b7058862bc5e8eef3c
209b80c93f611ef2769e5d5e35c2d3ceb23a39b96ee25d3d1ea07a44e9acb520
57855f6d8037dcc7270a7a0f7a0f9e0b0613fac31b5138438a628f844f828752
8f169d7df300ae72ab257a9ad6701984419cb603707dd119df9dd5659fe8553a
314e8b9fbb7e7a02666e7c30553e56293735ece385ff77e51f0727cc79b50f0d
fde8390ff71afd7c9b0681899a26e1a6dd32b5514bb4f4f455410f8ac353f136
996ad34c1b3c0f7692ea01423ef3ab8397f84ca31af7d494bfc7df02dc95875a
6b620f28239ea5ca6db5d7b09b39d26f6686642a13746d0f9c8f6c569109295a
3c52b3fdf22c0640f3dfe322c757ee090fb39dc8237e695b7e31dbe713101275
df63ebccda1abc8744bbecfa8c8932bfe0d05539a90d0be599a5ed59c9c8ed4c
e6b4bbb310236b3f5ffe9339b74110bee9945fd033d40d5f211ac1704a44d5ce
79f68e5ca30b0b726b17f15598f6a1e72b03f9b0b0267b7d7a1171b0881ab418
aa85baadc48d92a9ac6e88cd00c82a0b71ebcd2b5500596d684dfd2f949107b9
bd70d4eb636884a814558adce76844188ac186a283fb8e6aaf9f154ae74f8513
2368195d636eeaa64af2606c602dab0ae07f06db61ca0e792337063c277f314d
d8db36a3dd6410eac0216b0dbc0b045e27058567baafa3f47309516beb5e8641
2f780fbe426ec668667aaa54a902cfab80f47cc1e3ef39017ef15845279384db
f8fbc50db8de41fbcf7dcf31883c086b50d0cc74fbbd94979893fc26c9898f76
e6173a0a906d3259d4a9006b61901262705e309a6e5bc1cdfc035e3a78e2f225
e591b90146b4483163c89abfb8186c2cb3612419210b995d44da912a0edbb3f5
c6f08559551f3db557a40537c7686831bffc968df3aa6221082fa2479be4a5fa
8a3fbe98382adc07249d50db1aab8377b9587018be3598ef35cfc5d35495519a
a6620b369dee6c28694126b0082095615115654e5bc3b71f333f4a3fe21f6738
113b4a475304071ca2045537f2af8ba4c5db14a4ab20b2f97fa0037bbb212fda
3bd622b55a64a74a2452fc882cd26f3adef86400b4d4000aed0791682dd43a25
f350aca2f9d006666d3db133138e81016910ca7a9fa759e94d99b66a49ec959a
829211e85341e401813b02bb507b55fe9c2cddd752d33bc0cf369501b257756e
1d4a3cf7719a5214e5dbb705e32ffb0f20af374d74e96b22256f96ce9eede77d
c9be74e0f09e7121dda6dbeef885d161c31c547ace3b662716674d2f3b3be668
5c9b485eebb9a1fb8301d5bc8ea80a1bf18af72ef3b885fdb7ae24c5d3fa9277
9b80c2bd0c5ec2dfe2582f49a7b58332d8a2081032bdf29ff8929c1ba0701c00
4f7ad0e22d4587766d583ec889c0062801ca9edd6ed50b9ad7154fe9e305b858
SH256 hash:
3bd622b55a64a74a2452fc882cd26f3adef86400b4d4000aed0791682dd43a25
MD5 hash:
ae8c84fa162ade0523a8f791c3203854
SHA1 hash:
64e661c1fadf7e0642c03792f49df01f8426429a
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 3bd622b55a64a74a2452fc882cd26f3adef86400b4d4000aed0791682dd43a25

(this sample)

  
Delivery method
Distributed via web download

Comments