MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e38c14c9a27966b7768fa6a61a0bc86b79fdf8f554d232c26d0a13cd8dcdc36. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 6 File information Comments

SHA256 hash: 3e38c14c9a27966b7768fa6a61a0bc86b79fdf8f554d232c26d0a13cd8dcdc36
SHA3-384 hash: aa71efb12cf99ecd68e183d1c59a0129371566714d825ff8b37a273053330b33857521dfaaa1b084e3b828749c0ee111
SHA1 hash: cc6284365d1d47460bed78dce4e237b95166a859
MD5 hash: dbe7d59705f5f919cc6354b81d746584
humanhash: snake-lactose-kansas-maryland
File name:dbe7d59705f5f919cc6354b81d746584.exe
Download: download sample
Signature RedLineStealer
File size:2'421'760 bytes
First seen:2022-11-09 05:25:19 UTC
Last seen:2022-11-09 06:41:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 02951e73b23a430852958a5fac567566 (2 x RedLineStealer, 2 x PrivateLoader, 1 x ArkeiStealer)
ssdeep 49152:D0h8WyLIxcxU0oQGqmIHyPFUI/G7y3NmbzoZAXCRWlR1ObMyJTKiW:D0htUIOxUXlIHuaf7y3gz1KbM
TLSH T1C8B55B31E340F056FCA200F6E5AB05FA58645930B39144FBE7C0BD9A6AB56D2FA34B53
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 719d8d7173f17317 (3 x PrivateLoader, 2 x RedLineStealer, 2 x Amadey)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.106.191.22:47242

Intelligence


File Origin
# of uploads :
2
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
dbe7d59705f5f919cc6354b81d746584.exe
Verdict:
Malicious activity
Analysis date:
2022-11-09 05:26:49 UTC
Tags:
evasion loader trojan rat redline amadey stealer opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
DNS request
Sending an HTTP GET request
Sending a custom TCP request
Replacing files
Reading critical registry keys
Launching a service
Launching a process
Creating a file
Connecting to a non-recommended domain
Sending a UDP request
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Creating a window
Searching for synchronization primitives
Creating a file in the Program Files subdirectories
Searching for the window
Launching the default Windows debugger (dwwin.exe)
Blocking the Windows Defender launch
Unauthorized injection to a recently created process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint greyware shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, CryptOne, Fabookie, PrivateLoade
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected CryptOne packer
Yara detected Fabookie
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 741606 Sample: npLfeqK4z7.exe Startdate: 09/11/2022 Architecture: WINDOWS Score: 100 122 Malicious sample detected (through community Yara rule) 2->122 124 Antivirus detection for URL or domain 2->124 126 Multi AV Scanner detection for dropped file 2->126 128 21 other signatures 2->128 8 npLfeqK4z7.exe 10 50 2->8         started        13 ClipManager_Svc.exe 2->13         started        15 ClipManager_Svc.exe 2->15         started        process3 dnsIp4 104 193.106.191.22 BOSPOR-ASRU Russian Federation 8->104 106 87.240.132.67 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 8->106 108 17 other IPs or domains 8->108 72 C:\Users\...\wKa6UMxbCXu2MIy5z_5Pfwoe.exe, PE32 8->72 dropped 74 C:\Users\...\tSOp2FV_Lh664BRKaE15VXNj.exe, PE32 8->74 dropped 76 C:\Users\...\sFbsVru2exdaQ37Z0Q3u0Ker.exe, MS-DOS 8->76 dropped 78 18 other malicious files 8->78 dropped 146 Creates HTML files with .exe extension (expired dropper behavior) 8->146 148 Disables Windows Defender (deletes autostart) 8->148 150 Modifies Group Policy settings 8->150 152 Disable Windows Defender real time protection (registry) 8->152 17 sFbsVru2exdaQ37Z0Q3u0Ker.exe 8->17         started        22 GV8JUUp__6gYQafKSdrTVjJd.exe 2 8->22         started        24 kY5ndS5CMRwx2KCmkKAEQK63.exe 3 8->24         started        26 11 other processes 8->26 file5 signatures6 process7 dnsIp8 96 149.154.167.99 TELEGRAMRU United Kingdom 17->96 54 C:\Users\...\Sp39j7GKX_DDn5L3XSBx9D8y.exe, MS-DOS 17->54 dropped 56 C:\Users\user\AppData\Local\...\WW14[1].bmp, MS-DOS 17->56 dropped 58 C:\...\PowerControl_Svc.exe, MS-DOS 17->58 dropped 130 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 17->130 132 Query firmware table information (likely to detect VMs) 17->132 134 Hides threads from debuggers 17->134 136 Tries to detect sandboxes / dynamic malware analysis system (registry check) 17->136 60 C:\Users\user\AppData\Local\...\is-IU8I7.tmp, PE32 22->60 dropped 28 is-IU8I7.tmp 22->28         started        62 C:\Users\user\AppData\Local\...\rovwer.exe, PE32 24->62 dropped 31 rovwer.exe 24->31         started        98 103.89.90.61 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 26->98 100 45.10.52.33 MTW-ASRU Russian Federation 26->100 102 9 other IPs or domains 26->102 64 C:\Users\user\AppData\Local\...\ZbEN7ns.cpl, PE32 26->64 dropped 66 C:\Users\user\AppData\Local\...\1115[1].xx, DOS 26->66 dropped 68 C:\...\ClipManager_Svc.exe, PE32 26->68 dropped 70 C:\ProgramData\Microsoft\...\Report.wer, Unicode 26->70 dropped 138 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 26->138 140 Tries to harvest and steal browser information (history, passwords, etc) 26->140 142 Writes to foreign memory regions 26->142 144 3 other signatures 26->144 35 Uxiy8nU8YGASMPhR3OKO7UTk.exe 26->35         started        37 vbc.exe 26->37         started        39 schtasks.exe 26->39         started        41 5 other processes 26->41 file9 signatures10 process11 dnsIp12 80 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 28->80 dropped 82 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 28->82 dropped 84 C:\...\unins000.exe (copy), PE32 28->84 dropped 94 4 other files (2 malicious) 28->94 dropped 43 fzsearcher74.exe 28->43         started        112 193.56.146.243 LVLT-10753US unknown 31->112 86 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32 31->86 dropped 88 C:\Users\user\AppData\Local\...\cred64[1].dll, PE32 31->88 dropped 118 Multi AV Scanner detection for dropped file 31->118 120 Creates an undocumented autostart registry key 31->120 114 188.114.96.3 CLOUDFLARENETUS European Union 35->114 90 C:\Users\user\AppData\Local\Temp\db.dll, PE32 35->90 dropped 46 conhost.exe 35->46         started        92 C:\Users\user\AppData\Local\Temp\crea.exe, PE32+ 37->92 dropped 48 conhost.exe 39->48         started        116 20.42.73.29 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 41->116 50 conhost.exe 41->50         started        52 rundll32.exe 41->52         started        file13 signatures14 process15 dnsIp16 110 45.139.105.171 CMCSUS Italy 43->110
Threat name:
Win32.Trojan.MintPrivateLoader
Status:
Malicious
First seen:
2022-11-04 03:45:31 UTC
File Type:
PE (Exe)
Extracted files:
3
AV detection:
16 of 25 (64.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:privateloader family:redline botnet:6.67 infostealer main spyware stealer upx
Behaviour
Creates scheduled task(s)
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine payload
Malware Config
C2 Extraction:
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
208.67.104.60
103.89.90.61:34589
Unpacked files
SH256 hash:
3e38c14c9a27966b7768fa6a61a0bc86b79fdf8f554d232c26d0a13cd8dcdc36
MD5 hash:
dbe7d59705f5f919cc6354b81d746584
SHA1 hash:
cc6284365d1d47460bed78dce4e237b95166a859
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_auto win_privateloader_a0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:privateloader
Author:andretavare5
Description:PrivateLoader pay-per-install malware
Rule name:Privateloader_Main_Component
Description:Detects PrivateLoader Main Component
Rule name:win_privateloader
Rule name:win_privateloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.privateloader.
Rule name:win_privateloader_w0
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments