MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4edb9ceda2b49b682d3e30c4925610f81ffcc7d2b46a2d59d5930d6a1d69fbc7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



N-W0rm


Vendor detections: 16


Intelligence 16 IOCs 1 YARA 8 File information Comments

SHA256 hash: 4edb9ceda2b49b682d3e30c4925610f81ffcc7d2b46a2d59d5930d6a1d69fbc7
SHA3-384 hash: 787a55dec7d62bc01182faf3fff2f22d573bd2bb21df45ec8b5cd447763e2d4ca93e53ad6dfcbd95388ec39217ed7f26
SHA1 hash: 227ef6bb33e9f09cc7f2a63083a088076ebf1c29
MD5 hash: e66bceb5c12c3f3d84121e1715cdf15a
humanhash: alabama-snake-helium-jersey
File name:4EDB9CEDA2B49B682D3E30C4925610F81FFCC7D2B46A2.exe
Download: download sample
Signature N-W0rm
File size:233'472 bytes
First seen:2022-10-26 05:35:36 UTC
Last seen:2022-10-26 07:26:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f8dcbf4afe0bd43b2e752d5350d94075 (2 x RedLineStealer, 1 x ArkeiStealer, 1 x N-W0rm)
ssdeep 6144:MFOMECUAIP4EMTB75EZQqYkcdQfBuuvKZrkJE7UE2jAu:MFOwUy7CkkcIuWsrtu
Threatray 4 similar samples on MalwareBazaar
TLSH T14034BF48F4E58971C8A92D320790C6E547AEF9342BE16FEF234C06B63E176F24456D2B
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe N-W0rm


Avatar
abuse_ch
N-W0rm C2:
77.73.134.24:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
77.73.134.24:80 https://threatfox.abuse.ch/ioc/847757/

Intelligence


File Origin
# of uploads :
2
# of downloads :
255
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
4EDB9CEDA2B49B682D3E30C4925610F81FFCC7D2B46A2.exe
Verdict:
Malicious activity
Analysis date:
2022-10-26 05:36:41 UTC
Tags:
trojan rat redline loader stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a window
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Reading critical registry keys
Running batch commands
Sending a TCP request to an infection source
Query of malicious DNS domain
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Laplas Clipper, RedLine, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
DLL side loading technique detected
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Laplas Clipper
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 730695 Sample: 4EDB9CEDA2B49B682D3E30C4925... Startdate: 26/10/2022 Architecture: WINDOWS Score: 100 105 clipper.guru 2->105 125 Snort IDS alert for network traffic 2->125 127 Malicious sample detected (through community Yara rule) 2->127 129 Antivirus detection for URL or domain 2->129 131 9 other signatures 2->131 11 4EDB9CEDA2B49B682D3E30C4925610F81FFCC7D2B46A2.exe 1 2->11         started        13 svcupdater.exe 2->13         started        17 chrome.exe 2->17         started        19 chrome.exe 2->19         started        signatures3 process4 dnsIp5 21 AppLaunch.exe 15 10 11->21         started        26 conhost.exe 11->26         started        123 clipper.guru 45.159.189.115 HOSTING-SOLUTIONSUS Netherlands 13->123 171 Multi AV Scanner detection for dropped file 13->171 173 Machine Learning detection for dropped file 13->173 signatures6 process7 dnsIp8 107 77.73.134.24, 49699, 80 FIBEROPTIXDE Kazakhstan 21->107 109 o3serverfilessl.site 188.225.39.7, 49701, 80 TIMEWEB-ASRU Russian Federation 21->109 111 3 other IPs or domains 21->111 85 C:\Users\user\AppData\Local\...\ofg.exe, PE32 21->85 dropped 87 C:\Users\user\AppData\Local\...\chrome.exe, MS-DOS 21->87 dropped 89 C:\Users\user\AppData\Local\...\brave.exe, PE32+ 21->89 dropped 91 C:\Users\user\AppData\Local\...\app.exe, PE32 21->91 dropped 133 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 21->133 135 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 21->135 137 Tries to harvest and steal browser information (history, passwords, etc) 21->137 139 Tries to steal Crypto Currency Wallets 21->139 28 chrome.exe 1 21->28         started        32 brave.exe 1 15 21->32         started        34 app.exe 21->34         started        36 ofg.exe 5 21->36         started        file9 signatures10 process11 file12 93 C:\WindowsbehaviorgraphoogleUpdate.exe, PE32 28->93 dropped 163 Multi AV Scanner detection for dropped file 28->163 165 Detected unpacking (changes PE section rights) 28->165 167 Machine Learning detection for dropped file 28->167 169 7 other signatures 28->169 38 GoogleUpdate.exe 28->38         started        42 powershell.exe 28->42         started        44 schtasks.exe 28->44         started        46 schtasks.exe 28->46         started        95 C:\Users\user\AppData\...\nvdrivesllapi.exe, PE32+ 32->95 dropped 97 C:\Users\user\AppData\...\LetterEngine.dll, PE32 32->97 dropped 99 C:\Users\user\AppData\...ntityFramework.dll, PE32 32->99 dropped 101 C:\Users\...ntityFramework.SqlServer.dll, PE32 32->101 dropped 48 nvdrivesllapi.exe 32->48         started        50 RegSvcs.exe 20 34->50         started        103 C:\Users\user\AppData\...\svcupdater.exe, PE32 36->103 dropped 53 cmd.exe 36->53         started        signatures13 process14 dnsIp15 113 141.95.93.189 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 38->113 115 api.peer2profit.com 172.66.43.60 CLOUDFLARENETUS United States 38->115 117 192.168.2.1 unknown unknown 38->117 141 Detected unpacking (changes PE section rights) 38->141 143 Detected unpacking (creates a PE file in dynamic memory) 38->143 145 Detected unpacking (overwrites its own PE header) 38->145 161 2 other signatures 38->161 55 netsh.exe 38->55         started        57 netsh.exe 38->57         started        59 netsh.exe 38->59         started        61 conhost.exe 42->61         started        63 conhost.exe 44->63         started        65 conhost.exe 46->65         started        147 Query firmware table information (likely to detect VMs) 48->147 149 Tries to detect sandboxes and other dynamic analysis tools (window names) 48->149 151 Tries to detect sandboxes / dynamic malware analysis system (registry check) 48->151 119 t.me 149.154.167.99 TELEGRAMRU United Kingdom 50->119 121 78.47.204.168 HETZNER-ASDE Germany 50->121 83 C:\ProgramData\sqlite3.dll, PE32 50->83 dropped 153 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 50->153 155 Tries to harvest and steal browser information (history, passwords, etc) 50->155 157 DLL side loading technique detected 50->157 159 Tries to steal Crypto Currency Wallets 50->159 67 cmd.exe 50->67         started        69 conhost.exe 53->69         started        71 schtasks.exe 53->71         started        file16 signatures17 process18 process19 73 conhost.exe 55->73         started        75 conhost.exe 57->75         started        77 conhost.exe 59->77         started        79 conhost.exe 67->79         started        81 timeout.exe 67->81         started       
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-09-21 00:25:33 UTC
File Type:
PE (Exe)
AV detection:
32 of 42 (76.19%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:vidar botnet:1707 botnet:@kuraganft evasion infostealer persistence spyware stealer themida trojan
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Themida packer
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies WinLogon for persistence
RedLine
RedLine payload
Vidar
Malware Config
C2 Extraction:
77.73.134.24:80
https://t.me/slivetalks
https://c.im/@xinibin420
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
4edb9ceda2b49b682d3e30c4925610f81ffcc7d2b46a2d59d5930d6a1d69fbc7
MD5 hash:
e66bceb5c12c3f3d84121e1715cdf15a
SHA1 hash:
227ef6bb33e9f09cc7f2a63083a088076ebf1c29
Malware family:
RedLine.D
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly,rony
Description:Vidar Payload
Rule name:Windows_Trojan_RedLineStealer_3d9371fd
Author:Elastic Security
Rule name:Windows_Trojan_Vidar_114258d5
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments