MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 47db202a3deef7ab702bf1d5c2e1451acf5a46f2ea6ada502cfbe966e6132339. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 2 YARA 12 File information Comments

SHA256 hash: 47db202a3deef7ab702bf1d5c2e1451acf5a46f2ea6ada502cfbe966e6132339
SHA3-384 hash: c4afb4aedc31b121644e83e8aa615c4b527cbae444d24ae3754c10b0f5535d08167393fd4fa91d701c06a1dcdfe2e8ff
SHA1 hash: afb626c7cb0cd8e50b5a82ec179c1b5b94df6014
MD5 hash: 08cce0ceaaef515e4b93f0f826ec55f5
humanhash: bluebird-alaska-comet-quiet
File name:47DB202A3DEEF7AB702BF1D5C2E1451ACF5A46F2EA6AD.exe
Download: download sample
Signature RedLineStealer
File size:15'627'458 bytes
First seen:2022-01-26 13:25:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 393216:x4Pjf9ONhMEb3eYzBl+ygldqdadM3B50MUgxUxujr6xccez3fd:qr9OXDbnzBuldqdadM2Ar9cez3fd
Threatray 2'321 similar samples on MalwareBazaar
TLSH T199F633A7BC48D0EEEF56E43D264871B246B2A209CDD3C8D6532841485FF6799F8CB361
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.215.113.29:20819

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.29:20819 https://threatfox.abuse.ch/ioc/334657/
http://185.163.204.47/ https://threatfox.abuse.ch/ioc/340640/

Intelligence


File Origin
# of uploads :
1
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Running batch commands
Sending a custom TCP request
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Spyware.Generic
Status:
Suspicious
First seen:
2021-12-11 05:09:48 UTC
File Type:
PE (Exe)
Extracted files:
409
AV detection:
30 of 43 (69.77%)
Threat level:
  2/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:raccoon family:redline family:socelars botnet:03.12_build_3 botnet:4da27d123a577c68e42716053343dd3f8da508a2 botnet:@tui botnet:efc20640b4b1564934471e6297b87d8657db774a botnet:user1 aspackv2 discovery evasion infostealer loader spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NirSoft WebBrowserPassView
Nirsoft
OnlyLogger Payload
Modifies Windows Defender Real-time Protection settings
OnlyLogger
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
Malware Config
C2 Extraction:
http://www.yarchworkshop.com/
185.215.113.44:23759
45.9.20.221:15590
23.88.118.113:23817
Unpacked files
SH256 hash:
a2d0b166439fcadf2a9a1a33fad18cacac5cc64eec901e4790daee2c06f30b06
MD5 hash:
7c575c754da905d21b0485cfbbaed5c5
SHA1 hash:
4963cb94677e90d098a555a84f174a52b61dee90
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
fb8dc0272a15b72acb0e9e4836ef4db6b888baae8ee9c40340284cbf802f3675
MD5 hash:
87a1f1791f691c79ccfee34459131f5b
SHA1 hash:
0d3e3375456dc80a57707be394e5facb3d9537bd
SH256 hash:
3e627ea5a0a3ed72c6f60b3a9c3ee0a2264cc22178ea20aba1cedb43919a60e3
MD5 hash:
ebfee6765c7e448e3ea21b40550d1a70
SHA1 hash:
08464d94727b3a9f523b93ddbaf21191c65214e5
SH256 hash:
a0eb2aca5b5dbd126988e63d6d7a934b8e9a22f49d2e6fdc438785866589fe1c
MD5 hash:
5b1e44f615afd5759ac6165f1a04d857
SHA1 hash:
0c29172cef08c14cf5af545b742f663160a02224
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
23491f7cfd3e4188496e25651a6e7747549fa02193ed7e28fc5f62df06c1bb46
MD5 hash:
afc39c521ec6a8e19d9138aac3261a81
SHA1 hash:
b774fca05e021f6e21c270a41f5c750023cae001
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
03d2c4fcf7ef737ff212dc72ba94bedb519c2b8b34563071aca0e8963fcc816e
MD5 hash:
3663ad68c7217f1f034e3d0b76d409a3
SHA1 hash:
2a0e238fa1b291d806fe6b9337e475e3f2d7d3cd
SH256 hash:
7b1de37c4c437ccd868cc75864a0c4d9dfc9385b6a239fc7ca16496c96232e82
MD5 hash:
b2b2f2a785548e2fe8c3ca7196523add
SHA1 hash:
2d11a08ec73f6c78689e1f2e70233115585a4c81
SH256 hash:
8c2768756711ce47a6daaf9c2fc2fb964ddf7de539f4ca5392b4e8f430dfdcf6
MD5 hash:
f68536676e5d116031a9666ea3004e50
SHA1 hash:
bf199cc899ff95912af17dab6a94230be15cccd1
SH256 hash:
579297d515c9b33544437d15a9f2ff02c23ea07b3b98be62359f53d986a57f48
MD5 hash:
ecba2e7696b7781d386deeede518304f
SHA1 hash:
fa3e6839c6787b2c8af0b23f025e1cdffc28bccc
SH256 hash:
61b61acf352737cbe8bcca5a388a39d3f49358e8e5bc8318cdc0cbc153374ddf
MD5 hash:
dddb989b6801e4ae7ccdac62efc7060b
SHA1 hash:
cc6d4da95cd955670a6897e08997786062b93745
SH256 hash:
65f1ce743407b26e78ef5925b013e15ece15da5dd3b2e7102f9f443642c5bab2
MD5 hash:
3e8d3f1c5573d706b70a2303a866ff53
SHA1 hash:
f8737c4c908ba52c4fce78c4079c680dd772f7df
SH256 hash:
82318148cea5ca6cccee428e4cc3bfb1a8d0b562120398bd0c44afc2d9e5a658
MD5 hash:
8946cd0fb54758274762cee413fad941
SHA1 hash:
8af526f4a965e4399adeacef94783deab4278dc8
SH256 hash:
f093b271dec19dcb43ad5d8825695ef1abc4f432d36501efef8c0038e97c4dec
MD5 hash:
27c89dc4b89d0c6b333bf1e17b8d71fa
SHA1 hash:
f9d1325a25dc851a9c69f233adfbf2d28e269120
SH256 hash:
1a7a86c64ebecdc9d8baee4c95ed2beea44f4c19a1e0beb0be73b7edcf139d01
MD5 hash:
b0c349efccee019c281de3941b312e3a
SHA1 hash:
057b8913894d79163c7e7292b3316dc4a4ed7a5a
SH256 hash:
1908cac443610b332e8adfc72481d2a225b72e679ff468d1643782e9c2d96e7c
MD5 hash:
60d12965e7dd763580b316f0743731c6
SHA1 hash:
54b2f29a834a6f9e931a19e3f53c27a132e19c19
SH256 hash:
da37723dbc887717a85940cdc3bda4a630d31e94a7af355558452a7c8d8ca5de
MD5 hash:
18f6ecc14ec6cbf833e7ab3dd31b5b36
SHA1 hash:
c2da6b4b158331a7f7bb9fa47f111e6fec7b8ecb
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
ee821f8bf24cec68cced8a322129e322a9e5a20f2d92dd2f0b0827aff4711343
MD5 hash:
5eda69604c85537ab3fbaf77da60b2cb
SHA1 hash:
5d0a8f3efa0b26f52fe36eac2583ac419b6dd11d
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
3e2b9c66bd68d25698428ba57a0e11879ea3646b581c52ae93d126dc41f4e436
MD5 hash:
4247f3112333a0e2f945619e78b66a52
SHA1 hash:
f0d551316fcd10df3b101e30d434333a3e695c12
SH256 hash:
6cfc7fe1d24916740ef6de9dd5a3b5b90b2bb5c387024e1b889aa9fab6c0ca9c
MD5 hash:
b5146cb462433d2fbc4a073009694089
SHA1 hash:
e407ce2ed313f3c1e94ba8c379d077a989c079ca
SH256 hash:
64a889cf062dcf0234e3f054aa7c51e2011528b442187045455129019b0405de
MD5 hash:
20b8e459d1995783582702b4af57b52d
SHA1 hash:
d65a386ba7a3fa445ebe3aecc2e6b7ae4a346d49
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
50f20bc4ca022cb44d9738c30986ed53988007a74aaf24a381b8455b2b37a1ea
MD5 hash:
2da2a5249a6dc0f72c5de2be565b2ef4
SHA1 hash:
aed67b62688fa72bcce3a2fcb14dd9886c193387
SH256 hash:
e0afbd91f3b124f5f360417a39e05800491e9bb680b7a86215e6ea034b961a54
MD5 hash:
6101c7dd0acae5041b827d85028b294f
SHA1 hash:
9c52687dbf743b3ba7687dd4aa8ff06f8da428fb
SH256 hash:
ebc4a1dd50db9399ee51db58d347cc3bb418881fd6d75798cccb1124981b425c
MD5 hash:
74ac513d609020b9a69f15f2fcdea2a7
SHA1 hash:
922c8234f8338d78438ce3e48bcd456b67ffa284
SH256 hash:
999bff6bbb633033c8b1490d2c39208b2cac48336dd4b97e24584fa062479105
MD5 hash:
cb8ec844d7d2881cdd5dd89903d46e44
SHA1 hash:
4ee64fdb434e53590078e0a1a3e3027e632e2d90
SH256 hash:
47db202a3deef7ab702bf1d5c2e1451acf5a46f2ea6ada502cfbe966e6132339
MD5 hash:
08cce0ceaaef515e4b93f0f826ec55f5
SHA1 hash:
afb626c7cb0cd8e50b5a82ec179c1b5b94df6014
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:grakate_stealer_nov_2021
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_OnlyLogger
Author:ditekSHen
Description:Detects OnlyLogger loader variants
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments