MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 48267b826fa7ec0cea8be878f979a967d0a091cccea9f226ad8d87b29dc94800. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | 48267b826fa7ec0cea8be878f979a967d0a091cccea9f226ad8d87b29dc94800 |
|---|---|
| SHA3-384 hash: | 6bd4e3e2717f45ac551c98206d9fa4eaac5e4b9251d93b7bd86d5f97257b4654d63c50d53d059adee438ace5bc85e4ed |
| SHA1 hash: | 7751ce911e1b45f925f214fe1fb6b96e5fd9204d |
| MD5 hash: | abf60d26f7062fa3ed554d4ed437c8f9 |
| humanhash: | salami-salami-north-arkansas |
| File name: | abf60d26f7062fa3ed554d4ed437c8f9.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 14'424'344 bytes |
| First seen: | 2021-12-31 21:05:44 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer) |
| ssdeep | 393216:xkY58Sudkv7xjt2H69ZahHIqLWiMtrLeYqWia3Je:66EdkvRsNPLWiuLiXt |
| Threatray | 906 similar samples on MalwareBazaar |
| TLSH | T192E633793AF096A3D90244B1DFA9E2DBB23F54A14A447187D310B1F86F38596F64BE0C |
| File icon (PE): | |
| dhash icon | 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 88.99.35.59:63020 | https://threatfox.abuse.ch/ioc/290203/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
339
Origin country :
n/a
Vendor Threat Intelligence
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
arkeistealer barys mokes overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Vidar
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disables Windows Defender (via service or powershell)
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Sigma detected: Powershell Defender Exclusion
Sigma detected: Shell32 DLL Execution in Suspicious Directory
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2021-12-29 18:05:13 UTC
File Type:
PE (Exe)
Extracted files:
479
AV detection:
26 of 43 (60.47%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
agenttesla
raccoon
trickbot
Similar samples:
+ 896 additional samples on MalwareBazaar
Result
Malware family:
xmrig
Score:
10/10
Tags:
family:smokeloader family:socelars family:vidar family:xmrig botnet:915 aspackv2 backdoor discovery miner persistence spyware stealer trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
XMRig Miner Payload
Process spawned unexpected child process
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
xmrig
Malware Config
C2 Extraction:
http://www.chosenncrowned.com/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
http://melchen-testet.at/upload/
http://zjymf.com/upload/
http://pbxbmu70275.cn/upload/
http://mnenenravitsya.ru/upload/
http://pitersprav.ru/upload/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
http://melchen-testet.at/upload/
http://zjymf.com/upload/
http://pbxbmu70275.cn/upload/
http://mnenenravitsya.ru/upload/
http://pitersprav.ru/upload/
Unpacked files
SH256 hash:
7e4c288f060981b8cfd9c908997578b69ffc16438672f065bd50784fab3edcca
MD5 hash:
d7159e861f2881a05ace80394d805087
SHA1 hash:
3dcf96205f2a95ffdb3c463c264b68d7babe03a8
SH256 hash:
0efac9c1f24c44e5265ba1c8a80e0169d8b4aa6e8df218c524c57942c246f578
MD5 hash:
3d3b789155f41db5f058047d8e78a552
SHA1 hash:
c2f8488bf2c823bd165f1a41b53427ca1b24acb4
SH256 hash:
7dce97154d24b9982361a37133e35aaf9106f3836bb48e27dd7daea568e75378
MD5 hash:
dd601e359de7b856efc57a630f90554e
SHA1 hash:
97995811c6bbb33ea6bf7cf808570dc6b15ed6e0
SH256 hash:
673d3ac584eac9a13df6885bedca1c421783bc52ba0f1ae805154850a0ae62bc
MD5 hash:
06d0483ff6b1a8068b807fcf155f1682
SHA1 hash:
1a605ba4af2781a515bd5044f5ca09427cf80922
Detections:
win_raccoon_auto
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
SH256 hash:
04e582850441e36ea75efefc30fdf7c7619cc4dd9b7931e32badb19491ae7ff8
MD5 hash:
4c08e664bf367d0558316ebcac26cf9e
SHA1 hash:
32148c45ec823838f426bd91d43693d7ef3dd821
SH256 hash:
cb96b418b1a0afa5c55aeb4ac231387d651d4a625739955b378f28947795378a
MD5 hash:
9f21f96d35113ad8411d781482bd7d6d
SHA1 hash:
c82bee35fcf7f32fc480af5772571e35b99f5783
SH256 hash:
38d7d3b90e6943b81f3a4124e820dab00e83afaeb8be7eb3a4171d3140c91a3d
MD5 hash:
f712020db6e31b69900b86d69779a046
SHA1 hash:
85b8baf8a814aa0fe234a30b9a682bdcd78a1dd4
SH256 hash:
05578614aa84a61232fb95a5c08d2eb0a64fdbedf12fda22a1d508bd57ac4682
MD5 hash:
de440f9a3bf65d5018617785c4fe9356
SHA1 hash:
3e7be083bcecf13d78ea4029d38c11ad608b7408
SH256 hash:
0f4d75d5f326849567ceca7cdfae14987399acba3f1387be8b044cb4162db8af
MD5 hash:
fae12cbad3757f6508f72891ff6be0c1
SHA1 hash:
65da660f49948dc2343f238e0e1aa49ceef170fc
SH256 hash:
7ae47826ac78093ad204672394e3f6cbed10c9c28513b7813bc5a96ffda63658
MD5 hash:
c115f08f004a80b19c3bc646c91f3873
SHA1 hash:
82908dc17391a85f0699b18ba40219f5cb90c007
SH256 hash:
67964c15fcb8b1bb236f6b5187f831deb7fed27331473fb9ac9151b54283d631
MD5 hash:
3ad6ce4b97b1678a53b35abc093e0716
SHA1 hash:
43cee3950cb41184f4d579922ad0323b7edee335
SH256 hash:
3faf71242ecab4d2629daaf0d2938c2fde0b15d6a5730b12d71cf1281b1f1c87
MD5 hash:
3e2feed3112b44369d9b389e167d4334
SHA1 hash:
92411269e6726d9ef0e345637aedcc1f9ac83018
SH256 hash:
8a634cd72c0d75a7d7f3c5937771d31c16ab16b95d3cf3e5a1e047c6cb2beb40
MD5 hash:
9d3ff535d005b9e17b6212bb8506c01a
SHA1 hash:
ae16b00bf88a3455a95f2c919b98c295c587b838
SH256 hash:
52b9f76a3d8e919e0c978e6c8581f75ce4edace63caf1e44a10b42419cab8b48
MD5 hash:
42cc4f6aabdb36e4a26e2a383f318fe8
SHA1 hash:
8ce4f4f3d74213fc1553a88771d1f293296b56e8
SH256 hash:
48267b826fa7ec0cea8be878f979a967d0a091cccea9f226ad8d87b29dc94800
MD5 hash:
abf60d26f7062fa3ed554d4ed437c8f9
SHA1 hash:
7751ce911e1b45f925f214fe1fb6b96e5fd9204d
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.