MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 41f98a33b862b72dfa91c3f7757f5d3760418582809a310f1a2d52e3012e2f5c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | 41f98a33b862b72dfa91c3f7757f5d3760418582809a310f1a2d52e3012e2f5c |
|---|---|
| SHA3-384 hash: | 1139dadcfba739c3afc002c3a19db84f31258032cee5a23baca61daa4bf279645fabdc308b0dd4a5fb0bff0a878cab4f |
| SHA1 hash: | 1cef8d3c3003278d875338ee0426467d5a5e151d |
| MD5 hash: | a361d0ab7facb9cb9d4f4508c45e7514 |
| humanhash: | failed-enemy-alanine-ten |
| File name: | a361d0ab7facb9cb9d4f4508c45e7514.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 7'636'428 bytes |
| First seen: | 2021-12-18 00:15:47 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 196608:Jh5scqaiAWAEQRUC9loenRY9YSyWytAe6D:JaAfuC/oeRUdyLI |
| Threatray | 815 similar samples on MalwareBazaar |
| TLSH | T1457633E766B43D23E59F8071EA3C49A268B81FC001468AD1E7C76D8D294E674B01F76F |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 193.38.55.60:11329 | https://threatfox.abuse.ch/ioc/277016/ |
| http://178.62.232.173/ | https://threatfox.abuse.ch/ioc/277322/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
228
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Launching a process
Creating a window
DNS request
Sending an HTTP GET request
Searching for synchronization primitives
Sending a custom TCP request
Creating a process with a hidden window
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disables Windows Defender (via service or powershell)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-12-16 02:36:00 UTC
File Type:
PE (Exe)
Extracted files:
220
AV detection:
34 of 45 (75.56%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 805 additional samples on MalwareBazaar
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:915 botnet:media14n botnet:v2user1 aspackv2 backdoor discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.yarchworkshop.com/
https://mstdn.social/@sergeev43
https://koyu.space/@sergeev45
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
65.108.69.168:13293
159.69.246.184:13127
https://mstdn.social/@sergeev43
https://koyu.space/@sergeev45
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
65.108.69.168:13293
159.69.246.184:13127
Unpacked files
SH256 hash:
93d9ce6291eb10f727da27c487816b29fcba1b907d252f94d11ea0c3a99175fa
MD5 hash:
c7fc3bcb573b112eca27af5ef7192cce
SHA1 hash:
e43a907bdaced88d3c4444844e72d2381e9f1ad7
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
7e56bc9d1c885827dd139d3931115c2576e254732656717a4f4720fffc46a558
MD5 hash:
cea10f2bdc342d84ac5b092c86b033d3
SHA1 hash:
a17b0fe3989df310f2ebad1f46449782865a88cc
SH256 hash:
2a93372deb6f0605f375845720380f866fe0eecea899ca0c06c70cfa64cc4a93
MD5 hash:
75108a95a87c842b5df4a556be360458
SHA1 hash:
7aa74a8ba315480f32454df3a19c96684b726c6c
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
e872344ca4c82587001c1fe3dc69d48c400d77f7b4a1542632ee95e41621025d
MD5 hash:
6b4d4262afc607f1a75e82823d98f5c0
SHA1 hash:
ec58dff2695e23d9521dc9810bdfea2ebfb01db6
SH256 hash:
eedc6ea4c8ac8e8bc5b174271cbdbca451ae28b1b9fca988c3ea0b92cc9a33bb
MD5 hash:
e1052cd1d7a27c3a6088c12ccc4b14f4
SHA1 hash:
d575240875e1a86cea96f7f2c1862c8f7a39ca27
SH256 hash:
a217c5647e99c87db54e722d180f638fd177ce13a9ca423e7afd8eb8b0751bca
MD5 hash:
07d2500de1c4990446e97ee013c85c5e
SHA1 hash:
c367bece437303e7f8ab68dcd8cfb349e2bde445
SH256 hash:
fb5e44afa9b86e8d68f158b58036682dc28b8e3ed0d5391ffcd246f5bd8dec99
MD5 hash:
4c120576caedf379e15621df6328dfc0
SHA1 hash:
af3ddbcb753c2609d1b1c0985984a0957d9d0d0f
SH256 hash:
99f0b7f3850cf910e41e4f5ddb3a0dc31b8aacbd786ac4baf2d8da957688934f
MD5 hash:
081b25efff8d8aa6270f74b2785c3aec
SHA1 hash:
a516b6adca827f8f22579a56b7edec4816d4bcce
SH256 hash:
f6e04d2182b1d53e5aa9902ec837763200914553fdf882c9ab5a50b75912f845
MD5 hash:
b008f0dcfd3278bab12bc1741ef87655
SHA1 hash:
979d800c38fda3a0d36d233d2399834d96230592
SH256 hash:
cd3c5eadacc39e9beb7c0616f7d5bbbf023da8edc93b00d05778be0c9d69837c
MD5 hash:
59416449c8748957385cc3db99c1c48e
SHA1 hash:
7897a6667d7a25f76f2cd61e3c7f3054dfc48992
SH256 hash:
b99d7384c1384b58edeabe453e89b2e2acb52a7cc2086091ebcbdabcc24d2cd7
MD5 hash:
7994ba5d5cbc707f791286166b0dfb6b
SHA1 hash:
6f93c3e9b98944e46d3a9ee7cb6f0328f8c4e44e
SH256 hash:
4e7d1e35bada349f866f4c18308336966044e03c0a448e0f5059b0f729b0ef28
MD5 hash:
8596164361602a34ee7a2b53b9beed71
SHA1 hash:
4b980315cdfda5addddfc4aba6cd3c0acb2832f9
SH256 hash:
c174a3906076df74a7aef4bf648d49caf5bea1d2c40fead980776f7adad7b8dd
MD5 hash:
e74a80bbdba7f70208765fbb192176cb
SHA1 hash:
479491d21193ca8623e75471ebfc976b2a9ea166
SH256 hash:
6305d94fc2a98498e621d11300580c7f816074a5843feac5b59ff073347ac9ec
MD5 hash:
b1973a00bc9d5e2364196a454bca745a
SHA1 hash:
45f837f4a271aef5a96c7f169bba2451914ea1e4
SH256 hash:
4fcf88f5a017006310b155800167c43104332795d70da96f5708d941141edd98
MD5 hash:
0034cbb521ccb228922b6076a6c5c376
SHA1 hash:
1333211e90e5a19d90ddd424724f6de1fe1ec043
SH256 hash:
f45daafd61371b1f080a92eea8e9c8bfc9b710f22c82d5a06a1b1bf271c646ad
MD5 hash:
7e32ef0bd7899fa465bb0bc866b21560
SHA1 hash:
115d09eeaff6bae686263d57b6069dd41f63c80c
SH256 hash:
c249e684e33898b472a55b9fba5009db043d6750a4ab2ef40c2ded8552600880
MD5 hash:
1bd9356a7a9ca0c877a4e8a5f4bfd30b
SHA1 hash:
102c2a9d0194975eeb45792ca2e73b92f6f1acbe
SH256 hash:
788ea0253cf19f1d75bb553e5959b85f079f92f25602680e783e8686908d9b4f
MD5 hash:
6e52a42a905429239e7a062c0b485a6d
SHA1 hash:
0051cfad7adaf47c6ed0a1c6178d8120c938ff91
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
a7565e1865732064ff51cb093c515f80a2914b0f45c0d0c24e117d8b6dc68497
MD5 hash:
39ce9db5fdf3ec95d412cb6b6ef903b2
SHA1 hash:
004ea5c2c821bcf3f1cc7fce4548ca14a9ce7ab8
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
4bc27d81856eb497b95a5b2c4f6656d653b79224b17f7acc7ceec8de47284636
MD5 hash:
d2b731b26f7c9cc69985c30c02fcc0a5
SHA1 hash:
ee27df886eaa47ea65c0c6ae9c1e493cb16ea144
SH256 hash:
ccebd6ebe2ebd261ae920f6374b53097102f147e293f26e0f17e3bd011b1fb8f
MD5 hash:
67df702d3e09102a81ff57175a5d5a89
SHA1 hash:
e1f38ea9d715ef010c34aa90845e6c0bc663240a
SH256 hash:
0621e7b1403d377630027a1fda0be6a30ca0479a551c6c7b5b367a02833c5010
MD5 hash:
ec228b0feeea5a9a0ce282d849c2c7a3
SHA1 hash:
7a3e52da7c70b536bd2b2e707439904425210c41
SH256 hash:
13ababb2b0e34a9a5b17491fe387478a6383cd45dd86db7b0eb608762aa786ea
MD5 hash:
a3c2cb5efd7d3420e85c4149e7d0b863
SHA1 hash:
042968413b33c8a39c4a7ec066002cbc21a8e4eb
SH256 hash:
dfd854f3815c08010941f8212e23f5b9133f1153b6675e3d7745bf20a8f7bd17
MD5 hash:
09a4d8534a5339ec43695012180589ec
SHA1 hash:
ee2ead2499860e4f76b4f731c9d49f236f516541
SH256 hash:
41f98a33b862b72dfa91c3f7757f5d3760418582809a310f1a2d52e3012e2f5c
MD5 hash:
a361d0ab7facb9cb9d4f4508c45e7514
SHA1 hash:
1cef8d3c3003278d875338ee0426467d5a5e151d
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.