MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 50b0915a89953b0d9b31ab6238903eae3c4def950b699d0b3f60780902a525a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 16


Intelligence 16 IOCs YARA 1 File information Comments

SHA256 hash: 50b0915a89953b0d9b31ab6238903eae3c4def950b699d0b3f60780902a525a0
SHA3-384 hash: 255ddc56bf94a55ca82ac2d26ab317c59aa9edddd471a9d3e3b0c51e178c6a3334e214d3af475c92619190fc92daa651
SHA1 hash: c00d92fafbc4a7ea420275f012072cb959909554
MD5 hash: e410310c63297392eb3ce82844bfe3e7
humanhash: alabama-hawaii-zulu-aspen
File name:e410310c63297392eb3ce82844bfe3e7.exe
Download: download sample
Signature RecordBreaker
File size:608'256 bytes
First seen:2023-10-30 11:50:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 12288:BMr3y90EYftpajQtMyRNA+7EsF7KfznBk5:myt6act/D7Es0a
Threatray 1'212 similar samples on MalwareBazaar
TLSH T1EFD41247F7D98172D9791B7018F613C30B3A7EB609B4936B27A5EC5E0C72680983672B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe recordbreaker


Avatar
abuse_ch
RecordBreaker C2:
194.49.94.11:80

Intelligence


File Origin
# of uploads :
1
# of downloads :
374
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Сreating synchronization primitives
Launching a process
Launching cmd.exe command interpreter
Searching for synchronization primitives
Running batch commands
Adding an access-denied ACE
Searching for the browser window
DNS request
Sending a custom TCP request
Behavior that indicates a threat
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
89%
Tags:
advpack anti-vm CAB control explorer installer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Glupteba, Mystic Steal
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious values (likely registry only malware)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected Babadeda
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected Mystic Stealer
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1334200 Sample: ztA762yHV4.exe Startdate: 30/10/2023 Architecture: WINDOWS Score: 100 192 www.facebook.com 2->192 194 stim.graspalace.com 2->194 196 5 other IPs or domains 2->196 266 Snort IDS alert for network traffic 2->266 268 Found malware configuration 2->268 270 Malicious sample detected (through community Yara rule) 2->270 272 28 other signatures 2->272 14 ztA762yHV4.exe 1 4 2->14         started        17 svchost.exe 2->17         started        20 svchost.exe 2->20         started        22 explothe.exe 2->22         started        signatures3 process4 dnsIp5 166 C:\Users\user\AppData\Local\...\Uj4GY78.exe, PE32 14->166 dropped 168 C:\Users\user\AppData\Local\...\7is1Ar50.exe, PE32 14->168 dropped 24 Uj4GY78.exe 1 4 14->24         started        28 7is1Ar50.exe 14->28         started        186 127.0.0.1 unknown unknown 17->186 30 WerFault.exe 20->30         started        file6 process7 file8 144 C:\Users\user\AppData\Local\...\wn3FW36.exe, PE32 24->144 dropped 146 C:\Users\user\AppData\Local\...\6NB6dz2.exe, PE32 24->146 dropped 280 Antivirus detection for dropped file 24->280 282 Multi AV Scanner detection for dropped file 24->282 284 Machine Learning detection for dropped file 24->284 32 wn3FW36.exe 1 4 24->32         started        36 6NB6dz2.exe 24->36         started        39 cmd.exe 28->39         started        41 conhost.exe 28->41         started        signatures9 process10 dnsIp11 136 C:\Users\user\AppData\Local\...\5Sq0QJ6.exe, PE32 32->136 dropped 138 C:\Users\user\AppData\Local\...\3KS02RZ.exe, PE32 32->138 dropped 248 Multi AV Scanner detection for dropped file 32->248 43 3KS02RZ.exe 32->43         started        46 5Sq0QJ6.exe 3 32->46         started        198 193.233.255.73 FREE-NET-ASFREEnetEU Russian Federation 36->198 49 chrome.exe 39->49         started        52 chrome.exe 39->52         started        54 chrome.exe 39->54         started        56 7 other processes 39->56 file12 signatures13 process14 dnsIp15 286 Multi AV Scanner detection for dropped file 43->286 288 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 43->288 290 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 43->290 294 3 other signatures 43->294 58 explorer.exe 56 31 43->58 injected 170 C:\Users\user\AppData\Local\...\explothe.exe, PE32 46->170 dropped 292 Contains functionality to inject code into remote processes 46->292 63 explothe.exe 17 46->63         started        188 192.168.2.5 unknown unknown 49->188 190 239.255.255.250 unknown Reserved 49->190 65 chrome.exe 49->65         started        67 chrome.exe 49->67         started        69 chrome.exe 49->69         started        71 chrome.exe 52->71         started        73 chrome.exe 54->73         started        75 chrome.exe 56->75         started        77 6 other processes 56->77 file16 signatures17 process18 dnsIp19 206 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 58->206 208 77.91.68.249 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 58->208 216 3 other IPs or domains 58->216 154 C:\Users\user\AppData\Local\Temp\BF38.exe, PE32 58->154 dropped 156 C:\Users\user\AppData\Local\Temp\BB6E.exe, PE32 58->156 dropped 158 C:\Users\user\AppData\Local\Temp\AD73.exe, PE32+ 58->158 dropped 164 9 other malicious files 58->164 dropped 296 System process connects to network (likely due to code injection or exploit) 58->296 298 Benign windows process drops PE files 58->298 79 745E.exe 58->79         started        83 3E15.exe 58->83         started        85 85D5.exe 58->85         started        95 8 other processes 58->95 210 77.91.124.1 ECOTEL-ASRU Russian Federation 63->210 160 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 63->160 dropped 162 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 63->162 dropped 300 Multi AV Scanner detection for dropped file 63->300 302 Creates an undocumented autostart registry key 63->302 304 Uses schtasks.exe or at.exe to add and modify task schedules 63->304 87 rundll32.exe 63->87         started        89 cmd.exe 1 63->89         started        91 schtasks.exe 1 63->91         started        212 twitter.com 104.244.42.1 TWITTERUS United States 65->212 214 tpop-api.twitter.com 104.244.42.66 TWITTERUS United States 65->214 218 72 other IPs or domains 65->218 93 Conhost.exe 67->93         started        file20 signatures21 process22 dnsIp23 172 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 79->172 dropped 174 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 79->174 dropped 176 C:\Users\user\AppData\Local\Temp\kos4.exe, PE32 79->176 dropped 178 C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32 79->178 dropped 222 Antivirus detection for dropped file 79->222 224 Multi AV Scanner detection for dropped file 79->224 226 Machine Learning detection for dropped file 79->226 228 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 79->228 98 31839b57a4f11171d6abc8bbc4451ee4.exe 79->98         started        101 toolspub2.exe 79->101         started        103 kos4.exe 79->103         started        107 latestX.exe 79->107         started        180 C:\Users\user\AppData\Local\...\xl5Qg7JD.exe, PE32 83->180 dropped 182 C:\Users\user\AppData\Local\...\6fL82RI.exe, PE32 83->182 dropped 109 xl5Qg7JD.exe 83->109         started        184 C:\Users\user\AppData\...\Protect544cd51a.dll, PE32 85->184 dropped 230 Found many strings related to Crypto-Wallets (likely being stolen) 85->230 232 Writes to foreign memory regions 85->232 234 Allocates memory in foreign processes 85->234 236 Injects a PE file into a foreign processes 85->236 238 Contains functionality to modify clipboard data 87->238 115 7 other processes 89->115 111 conhost.exe 91->111         started        220 77.91.124.71 ECOTEL-ASRU Russian Federation 95->220 240 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 95->240 242 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 95->242 244 Creates autostart registry keys with suspicious values (likely registry only malware) 95->244 246 Tries to harvest and steal browser information (history, passwords, etc) 95->246 113 chrome.exe 95->113         started        117 10 other processes 95->117 file24 signatures25 process26 dnsIp27 250 Multi AV Scanner detection for dropped file 98->250 252 Detected unpacking (changes PE section rights) 98->252 254 Detected unpacking (overwrites its own PE header) 98->254 264 2 other signatures 98->264 256 Sample uses process hollowing technique 101->256 258 Injects a PE file into a foreign processes 101->258 202 iplogger.com 148.251.234.93 HETZNER-ASDE Germany 103->202 204 stim.graspalace.com 172.67.193.43 CLOUDFLARENETUS United States 103->204 148 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 103->148 dropped 150 C:\Users\user\AppData\Local\...\LY1tq2DI.exe, PE32 109->150 dropped 152 C:\Users\user\AppData\Local\...\5Oi04cI.exe, PE32 109->152 dropped 260 Antivirus detection for dropped file 109->260 262 Machine Learning detection for dropped file 109->262 119 LY1tq2DI.exe 109->119         started        122 chrome.exe 113->122         started        124 chrome.exe 117->124         started        126 chrome.exe 117->126         started        128 chrome.exe 117->128         started        130 4 other processes 117->130 file28 signatures29 process30 file31 140 C:\Users\user\AppData\Local\...\3SO8cT68.exe, PE32 119->140 dropped 142 C:\Users\user\AppData\Local\...\2gi471wC.exe, PE32 119->142 dropped 132 2gi471wC.exe 119->132         started        process32 dnsIp33 200 77.91.124.86 ECOTEL-ASRU Russian Federation 132->200 274 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 132->274 276 Found many strings related to Crypto-Wallets (likely being stolen) 132->276 278 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 132->278 signatures34
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-10-30 11:51:11 UTC
File Type:
PE (Exe)
Extracted files:
115
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:dcrat family:glupteba family:raccoon family:redline family:smokeloader family:xmrig family:zgrat botnet:6a6a005b9aa778f606280c5fa24ae595 botnet:@ytlogsbot botnet:grome botnet:kinza botnet:up3 backdoor brand:paypal collection discovery dropper evasion infostealer loader miner persistence phishing rat spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Detected potential entity reuse from brand paypal.
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Stops running service(s)
XMRig Miner payload
Amadey
DcRat
Detect ZGRat V1
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
Raccoon
Raccoon Stealer payload
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
ZGRat
xmrig
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
http://77.91.124.1/theme/index.php
77.91.124.86:19084
http://host-file-host6.com/
http://host-host-file8.com/
http://195.123.218.98:80
http://31.192.23
194.169.175.235:42691
Unpacked files
SH256 hash:
5b09af317e0944b1e8d2245440927fddb14d26aa5cae15204037e25027287ed1
MD5 hash:
60ae4d40230537d966ae9e82f91f66e3
SHA1 hash:
3cb1d95c4b90d2f548130153df84d1148821e90a
Detections:
Amadey win_amadey_auto
SH256 hash:
4df20fea38335a46777d65a7f7f9299e12ca7dde6e1d7b6703f0c162f7c47e69
MD5 hash:
d057180a802f80e3748100eefe31bc49
SHA1 hash:
07e1cd6feb95ddd68472e3b5c6845141be4fb032
Detections:
win_smokeloader_a2
SH256 hash:
a380746d6ff59049d6db7a5d957440f4193948ef85b3c7b51c22da4031936126
MD5 hash:
6a452daefddaf43e8562341164fe462a
SHA1 hash:
8984017f5c93a4934530e50d808f64d9ea6fe61f
SH256 hash:
7b24433fbcfacbe3d5421372011ca93d73f2b4bfe3dd7988bdbe7cf9dfac2878
MD5 hash:
de2f12d7debf5edc29e3dbe028b15c47
SHA1 hash:
e64f7b8f5e752cecfca992d98037bb784479c26f
SH256 hash:
50b0915a89953b0d9b31ab6238903eae3c4def950b699d0b3f60780902a525a0
MD5 hash:
e410310c63297392eb3ce82844bfe3e7
SHA1 hash:
c00d92fafbc4a7ea420275f012072cb959909554
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RecordBreaker

Executable exe 50b0915a89953b0d9b31ab6238903eae3c4def950b699d0b3f60780902a525a0

(this sample)

  
Delivery method
Distributed via web download

Comments