MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5206fdece52fc94064c037f1f656cc4a6a8e961422aa6795f8fee4e5702086f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ErbiumStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 1 File information Comments

SHA256 hash: 5206fdece52fc94064c037f1f656cc4a6a8e961422aa6795f8fee4e5702086f2
SHA3-384 hash: f77544b82131e7658f17d448cd867788cdca772f7ba11649a6883ae6739f947700ebccaebd01745586e5471911d53886
SHA1 hash: eb7ee4753dd4b345072f232900572e9da7a1f11d
MD5 hash: 3e297ba0dfe0adc42b62220a21a0bb33
humanhash: apart-fillet-burger-cat
File name:3e297ba0dfe0adc42b62220a21a0bb33.exe
Download: download sample
Signature ErbiumStealer
File size:2'620'334 bytes
First seen:2022-10-06 14:17:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 09d7f8249a36bc0ff07a4d3c56b1a15e (6 x RedLineStealer, 2 x ArkeiStealer, 2 x DCRat)
ssdeep 24576:uUufr84d65LfmUT46zhlWQmZYHY0t3MohKnMFB0OdqWI7ffYyvxMMlFLYrkl3Ruy:0T8jh1T46zhYQeEBSsyvxMMlFErkl3t
Threatray 160 similar samples on MalwareBazaar
TLSH T152C51B135A8B0D75DDD23BB4A1CB633EA734ED30CA2A8B7FB608C43959532C56C5A742
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:ErbiumStealer exe


Avatar
abuse_ch
ErbiumStealer C2:
http://deadxbc9.beget.tech/api.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://deadxbc9.beget.tech/api.php https://threatfox.abuse.ch/ioc/871883/

Intelligence


File Origin
# of uploads :
1
# of downloads :
237
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
80%
Tags:
anti-debug anti-vm overlay spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Erbium Stealer, Raccoon Stealer v2, RedL
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Writes to foreign memory regions
Yara detected Erbium Stealer
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 717567 Sample: xSeFxBPmvQ.exe Startdate: 06/10/2022 Architecture: WINDOWS Score: 100 64 zaraat.xyz 2->64 66 www.google.com 2->66 68 8 other IPs or domains 2->68 82 Snort IDS alert for network traffic 2->82 84 Multi AV Scanner detection for domain / URL 2->84 86 Malicious sample detected (through community Yara rule) 2->86 88 10 other signatures 2->88 9 xSeFxBPmvQ.exe 1 2->9         started        signatures3 process4 signatures5 96 Contain functionality to detect virtual machines 9->96 98 Contains functionality to inject code into remote processes 9->98 100 Writes to foreign memory regions 9->100 102 Injects a PE file into a foreign processes 9->102 12 AppLaunch.exe 37 9->12         started        17 conhost.exe 9->17         started        process6 dnsIp7 70 77.73.133.53, 49699, 49701, 80 AS43260TR Kazakhstan 12->70 72 github.com 140.82.121.4, 443, 49705, 49706 GITHUBUS United States 12->72 74 3 other IPs or domains 12->74 48 C:\Users\user\...\xqcplvfxjcnduysbizaq.exe, PE32 12->48 dropped 50 C:\Users\user\...\wtrwykagorbglhxsqkw.exe, PE32 12->50 dropped 52 C:\Users\user\AppData\...\wqnjwgtmcebjh.exe, PE32 12->52 dropped 54 13 other files (4 malicious) 12->54 dropped 104 Tries to harvest and steal ftp login credentials 12->104 106 Tries to harvest and steal browser information (history, passwords, etc) 12->106 19 wqnjwgtmcebjh.exe 12->19         started        22 vfcbbhzj.exe 1 12->22         started        24 mppraknkt.exe 1 12->24         started        26 3 other processes 12->26 file8 signatures9 process10 signatures11 90 Multi AV Scanner detection for dropped file 19->90 92 Writes to foreign memory regions 19->92 94 Injects a PE file into a foreign processes 19->94 28 AppLaunch.exe 19->28         started        32 conhost.exe 19->32         started        34 AppLaunch.exe 2 22->34         started        36 conhost.exe 22->36         started        38 AppLaunch.exe 24->38         started        40 conhost.exe 24->40         started        42 conhost.exe 26->42         started        44 AppLaunch.exe 26->44         started        46 3 other processes 26->46 process12 dnsIp13 76 89.185.85.53 OLIMP-SVYAZ-ASRU Russian Federation 28->76 56 C:\Users\user\AppData\...\vcruntime140.dll, PE32 28->56 dropped 58 C:\Users\user\AppData\LocalLow\nss3.dll, PE32 28->58 dropped 60 C:\Users\user\AppData\LocalLow\msvcp140.dll, PE32 28->60 dropped 62 C:\Users\user\AppData\LocalLow\mozglue.dll, PE32 28->62 dropped 78 82.115.223.48 MIDNET-ASTK-TelecomRU Russian Federation 34->78 80 193.106.191.160 BOSPOR-ASRU Russian Federation 38->80 file14
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-10-02 08:40:20 UTC
File Type:
PE (Exe)
AV detection:
22 of 25 (88.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:erbium family:raccoon family:redline botnet:5397150605_99 botnet:@ebaniynoyname botnet:e734a12bc6119609a0b6a8bee6270055 infostealer persistence spyware stealer
Behaviour
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Erbium
Raccoon
RedLine
RedLine payload
Malware Config
C2 Extraction:
http://77.73.133.53/cloud/index.php
82.115.223.48:26393
193.106.191.160:8673
185.106.92.8:38644
http://89.185.85.53/
zaraat.xyz:37397
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
70afbed6c5dd9c2b70c80be89984048705c0fa5ed2d48b5a2b87fc862ee063e0
MD5 hash:
5fe13c88aeae0dc3d4e3e1057321cdd5
SHA1 hash:
83fe799ff3d6b65dcbe336d091ceacd694540e54
SH256 hash:
5206fdece52fc94064c037f1f656cc4a6a8e961422aa6795f8fee4e5702086f2
MD5 hash:
3e297ba0dfe0adc42b62220a21a0bb33
SHA1 hash:
eb7ee4753dd4b345072f232900572e9da7a1f11d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Erbium_Loader
Author:@_FirehaK <yara@firehak.com>
Description:Detects Erbium Stealer's loader

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments