MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4618fb57958c19496e668916d769cb40e6bb0a0af0fbb1ff73ee89e701f3fe9b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 9 File information Comments

SHA256 hash: 4618fb57958c19496e668916d769cb40e6bb0a0af0fbb1ff73ee89e701f3fe9b
SHA3-384 hash: 2bea6f08f44cb9b966fc1cada6756fdb837fd9f051d1bacd54135640afe6de582891c634d33bf1699a4b4aa3c12b6ed2
SHA1 hash: 55b0d9799dd6eeb6db186ea79d1aed9bab5a5329
MD5 hash: 29a777228d3aa5f015e88d6cdaa4555f
humanhash: robin-ohio-blue-indigo
File name:4618FB57958C19496E668916D769CB40E6BB0A0AF0FBB.exe
Download: download sample
Signature RedLineStealer
File size:5'693'972 bytes
First seen:2022-03-11 20:06:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xDmDmEuex7y4fn253yr4b8F7UxIDJW7cZCJFtUHCO2M3S5ik1RuKB47K+zVzV:x+V3xO4fnQyMb4QxId4lUHhY71RuKwlr
Threatray 1'172 similar samples on MalwareBazaar
TLSH T101463300BEBA58F0D58202316A5C6FABA77E53BC121544EF734461187FBE9CB906F5B8
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe N-W0rm RedLineStealer


Avatar
abuse_ch
N-W0rm C2:
http://194.180.158.174/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.106.191.67:44400 https://threatfox.abuse.ch/ioc/393504/
http://194.180.158.174/ https://threatfox.abuse.ch/ioc/393789/

Intelligence


File Origin
# of uploads :
1
# of downloads :
247
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Creating a window
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a file
Sending an HTTP GET request
Unauthorized injection to a recently created process
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Disables Windows Defender (via service or powershell)
Encrypted powershell cmdline option found
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 587701 Sample: 4618FB57958C19496E668916D76... Startdate: 11/03/2022 Architecture: WINDOWS Score: 100 52 212.193.30.45, 49795, 80 SPD-NETTR Russian Federation 2->52 54 80.66.64.208 VAD-SRL-AS1MD Russian Federation 2->54 56 18 other IPs or domains 2->56 70 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->70 72 Malicious sample detected (through community Yara rule) 2->72 74 Antivirus detection for URL or domain 2->74 76 20 other signatures 2->76 9 4618FB57958C19496E668916D769CB40E6BB0A0AF0FBB.exe 25 2->9         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\setup_install.exe, PE32 9->38 dropped 40 C:\Users\...\61ddd3ca3eb96_Tue19f3d0a57a8.exe, PE32 9->40 dropped 42 C:\Users\...\61ddd3c880425_Tue193f5a6f1.exe, PE32 9->42 dropped 44 17 other files (12 malicious) 9->44 dropped 12 setup_install.exe 1 9->12         started        process6 dnsIp7 66 127.0.0.1 unknown unknown 12->66 68 soniyamona.xyz 12->68 94 Performs DNS queries to domains with low reputation 12->94 96 Adds a directory exclusion to Windows Defender 12->96 98 Disables Windows Defender (via service or powershell) 12->98 16 cmd.exe 1 12->16         started        18 cmd.exe 12->18         started        20 cmd.exe 1 12->20         started        22 4 other processes 12->22 signatures8 process9 signatures10 25 61ddd3b519b32_Tue19f91ccf.exe 16->25         started        30 61ddd3b569e2d_Tue19b2c74b.exe 18->30         started        32 61ddd3b311eea_Tue19391e3179aa.exe 7 20->32         started        78 Adds a directory exclusion to Windows Defender 22->78 80 Disables Windows Defender (via service or powershell) 22->80 34 powershell.exe 25 22->34         started        36 powershell.exe 24 22->36         started        process11 dnsIp12 58 ip-api.com 208.95.112.1, 49796, 80 TUT-ASUS United States 25->58 60 www.hhiuew33.com 45.136.151.102, 49819, 80 ENZUINC-US Latvia 25->60 46 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 25->46 dropped 82 Antivirus detection for dropped file 25->82 84 Multi AV Scanner detection for dropped file 25->84 86 May check the online IP address of the machine 25->86 88 Machine Learning detection for dropped file 25->88 62 104.192.141.1 AMAZON-02US United States 30->62 64 52.217.173.57 AMAZON-02US United States 30->64 48 C:\Users\...\61ddd3b569e2d_Tue19b2c74b.exe, PE32 30->48 dropped 90 Encrypted powershell cmdline option found 30->90 92 Injects a PE file into a foreign processes 30->92 50 C:\Users\user\AppData\Local\Temp\wdzGXnoD.m, PE32 32->50 dropped file13 signatures14
Threat name:
Win32.Trojan.Bunitucrypt
Status:
Malicious
First seen:
2022-03-09 02:37:39 UTC
File Type:
PE (Exe)
Extracted files:
429
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:redline family:smokeloader family:socelars botnet:05v1user botnet:2 botnet:ww aspackv2 backdoor discovery evasion infostealer loader spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Malware Config
C2 Extraction:
http://www.assassinsx.com/
88.99.35.59:63020
193.203.203.82:23108
193.106.191.67:44400
http://nahbleiben.at/upload/
http://noblecreativeaz.com/upload/
http://tvqaq.cn/upload/
http://recmaster.ru/upload/
http://sovels.ru/upload/
Unpacked files
SH256 hash:
8ecf653ce6c35bb22a55938d30d21cca8bfe2a81a1a66f02ce078b2cdb954711
MD5 hash:
26a73c6c3ab01f8684aa3167d74ac207
SHA1 hash:
4ee18206f2179630a4d0620f7951c0210ecebe11
SH256 hash:
b3b629af14860d327c2e8c6b0f7be3342f9bf086a68b5cb0caf4bb7012159d63
MD5 hash:
dea97254098b0ce8e037e77811c1e95a
SHA1 hash:
dccef75c821f539f89a5487e36c1db8fd9cd1333
SH256 hash:
77dae8bfb2f71eb22292e284468dae35f8a7f0d6bccbb655979839447d13634c
MD5 hash:
89e7d1d102e675ef49f3dbf4040617e7
SHA1 hash:
38e83ba9c7201ea942fd5f6f464d4537007c1cd9
SH256 hash:
c67d03aab3ed99556c901190c120407749e94cfd10a3478b6a78985a475efa1b
MD5 hash:
efd491a6a1cf1fdfdbf29ca25753af40
SHA1 hash:
3bddc4c097ce86792b0fb170052c7aba5b1bb82b
SH256 hash:
96ded61beca893a24637e6da8b4d4f4ce5ba6420fc53edc9eeb5b35fdf3b65ef
MD5 hash:
52db6c26447e51084c4b0aef5b6d7376
SHA1 hash:
d9f16d0a7827c414aad3c51c940bf3b879333dde
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
e38a8ccf4894792679323c0bb51c2c75c3540076fed192f9aa6371a5c752ab5b
MD5 hash:
11e2aaab6dfe22a9aab8f2083deb5776
SHA1 hash:
feba86d5d1a7b945987ba175c206fe01ab6e27b4
SH256 hash:
d449e78438e2f61d1bd60aee5517cb985116da1fc5046632a512cee1f49334d7
MD5 hash:
21a8cffc9546d19d55c11b3eb1136da1
SHA1 hash:
c463507c714005e78006cebb5a5373c00be983ba
SH256 hash:
101e6855260894eedd33c7d0802d7df5d745c5e9384ac1af8548ab155b8acd63
MD5 hash:
68449698402cd03baa7b27e230a9b571
SHA1 hash:
b8ee064a7417a385642bbc4e61fad674a37b75d3
SH256 hash:
261a77e88d60b07e15b79819ad4fa6bec3536cb43a8916415cdc32b367908585
MD5 hash:
40bbf1a120ee97d318dda323612a631e
SHA1 hash:
b2057541674d5af2c0d2bfbbc8839ac366b824ce
SH256 hash:
79e28b64b6cbe2a8cc7c44bdc98410ce03331b1c856ca77f68af8cbd94de0dfd
MD5 hash:
fe86208ac6f590d49ce009ff11affbec
SHA1 hash:
9c4eb8a72c494175263a1c4c17109d94b5273984
SH256 hash:
d9e64c74f1a84d39f4f02ef00d5802a103f6ecfe4692358bd432ecd7e4cf2b67
MD5 hash:
7455b05b4b73f69d86dcb0562a2d1f80
SHA1 hash:
93801c0eeaaebade8af21100f87fff6bca6dc347
SH256 hash:
8ae2997c438cd4117c5837d22c5464010aa4a8303ba84933aff9847dcb50bc9b
MD5 hash:
57293ef54b694cb5e9da2cabd38cdba5
SHA1 hash:
7859932ef9e6a23742c9d90b10be8475b197638c
SH256 hash:
864a13a54a5ab27d69ba158c8ddcb143328431fe434e28235b2e65c8cdcb519e
MD5 hash:
f718a345b46aee73db0ab771d97a33e9
SHA1 hash:
7549bd43ac1f2c78498311f8bfd4d1658fdd4173
SH256 hash:
5f44a11ac74b31e4d70ad2255e2df72dca64a1a9cee2c232d22eedacb64a9e86
MD5 hash:
c67187ad2158f7a05d447bc9193f9d46
SHA1 hash:
6ec1c726b56ce45aaf8795e67f28b32a770877aa
SH256 hash:
a962bd1157017d37327c87486656053eabd08a0cca0b6c6c80b11e7eb30205c3
MD5 hash:
778650c51e0ad36b3e4f95447458ffd5
SHA1 hash:
3cedbd6df862b09fcc1bcb480eae60b8de362fb0
SH256 hash:
a25bd95aeb2115ef24d3545fc11150200f567027c0673daf0bbeede99a651b4a
MD5 hash:
8cb3f6ba5e7b3b4d71162a0846baaebd
SHA1 hash:
19543ffebd39ca3ed9296bfa127d04d4b00e422b
SH256 hash:
7e0a92c889b4b0ccd0df77d65335bc1c10108dcc2eba95baa474dc2cfb1d823f
MD5 hash:
61ef68663f2cc7bdc0c92e9fd91b7212
SHA1 hash:
c15d457dd13f8d3e5be66cb038987fb69ac97135
SH256 hash:
061311e39c408c8674659c505c744e38cf37d97de729e4c0a840ec7291c142af
MD5 hash:
743fbd46fc2879d793bb2c6a99ac4251
SHA1 hash:
a8f72de6570885466b292d369bab3ade528ef1dd
SH256 hash:
7913f33881ef047d8d521706c5abd08b2ff068165344fcbc2b57cd8987881e25
MD5 hash:
5caa1408a8e84becaa2e41bdfa1ebe0a
SHA1 hash:
b4f60072b8f991019bfca08dc00e31cad8e20429
SH256 hash:
8168f68bc24c92a50ba3b8b48dae6911857d40fa516ecef32394d45240ee5052
MD5 hash:
670e5bfa16190cba2203b9d7e22469a8
SHA1 hash:
116a963cfe6167df0d96fa51378dd93c0982737e
SH256 hash:
4618fb57958c19496e668916d769cb40e6bb0a0af0fbb1ff73ee89e701f3fe9b
MD5 hash:
29a777228d3aa5f015e88d6cdaa4555f
SHA1 hash:
55b0d9799dd6eeb6db186ea79d1aed9bab5a5329
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_OnlyLogger
Author:ditekSHen
Description:Detects OnlyLogger loader variants
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments