MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5950bc250aea30acdbd275a5c615555bff8401d295d80feae8dedbb8b1957402. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 8 File information Comments

SHA256 hash: 5950bc250aea30acdbd275a5c615555bff8401d295d80feae8dedbb8b1957402
SHA3-384 hash: 3cc011d4415afffead6e41cfc30174705533f7736779f80a009cd0e36c1ab3bbfded8df2bb6e389411f1f2d00530b35a
SHA1 hash: f30d3b25523eb799be9d2964184b228c03a10a68
MD5 hash: 3b76e79518bbfaf98fa6a051c3b72020
humanhash: vermont-alpha-ack-april
File name:file
Download: download sample
Signature RedLineStealer
File size:1'610'240 bytes
First seen:2023-10-21 20:10:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:ry/yJykxCHQv8+RsVei2TQNlfTuB3svH3C7VLUlSIdEV1vymPfQWvMVdQrlq0S:e24G/Cei2Klfqmf3COSlBBkdYw
TLSH T1BE75231367E20033CAF217B4A8F749CB1BB97D616D714B6B26985A4E1DB1AE0187133F
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://109.107.182.2/race/bus50.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
319
Origin country :
US US
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-10-21 20:19:28 UTC
Tags:
stealc stealer loader smoke amadey botnet trojan sinkhole redline opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Сreating synchronization primitives
Launching a service
Creating a file
Creating a window
Running batch commands
Launching cmd.exe command interpreter
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Blocking the Windows Defender launch
Disabling the operating system update service
Forced shutdown of a system process
Sending a TCP request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, LummaC Stealer, Mystic Stealer,
Detection:
malicious
Classification:
phis.troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Phishing site detected (based on logo match)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected LummaC Stealer
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1329755 Sample: file.exe Startdate: 21/10/2023 Architecture: WINDOWS Score: 100 189 www.challenger-am.com 2->189 191 raw.githubusercontent.com 2->191 193 13 other IPs or domains 2->193 223 Snort IDS alert for network traffic 2->223 225 Multi AV Scanner detection for domain / URL 2->225 227 Found malware configuration 2->227 229 22 other signatures 2->229 13 file.exe 1 4 2->13         started        16 svchost.exe 2->16         started        19 explothe.exe 2->19         started        21 ifgfhee 2->21         started        signatures3 process4 dnsIp5 163 C:\Users\user\AppData\Local\...\RB4yW44.exe, PE32 13->163 dropped 165 C:\Users\user\AppData\Local\...\6uP4DE9.exe, PE32 13->165 dropped 23 RB4yW44.exe 1 4 13->23         started        27 6uP4DE9.exe 13->27         started        173 127.0.0.1 unknown unknown 16->173 file6 process7 file8 139 C:\Users\user\AppData\Local\...\dQ2yk17.exe, PE32 23->139 dropped 141 C:\Users\user\AppData\Local\...\5Fn3iA8.exe, PE32 23->141 dropped 245 Antivirus detection for dropped file 23->245 247 Machine Learning detection for dropped file 23->247 29 dQ2yk17.exe 1 4 23->29         started        33 5Fn3iA8.exe 23->33         started        35 cmd.exe 27->35         started        signatures9 process10 file11 167 C:\Users\user\AppData\Local\...\kD7My31.exe, PE32 29->167 dropped 169 C:\Users\user\AppData\Local\...\4az082Rw.exe, PE32 29->169 dropped 291 Machine Learning detection for dropped file 29->291 37 kD7My31.exe 1 4 29->37         started        40 4az082Rw.exe 29->40         started        171 C:\Users\user\AppData\Local\...\explothe.exe, PE32 33->171 dropped 293 Antivirus detection for dropped file 33->293 43 explothe.exe 33->43         started        46 chrome.exe 35->46         started        48 chrome.exe 35->48         started        50 chrome.exe 35->50         started        52 conhost.exe 35->52         started        signatures12 process13 dnsIp14 131 C:\Users\user\AppData\Local\...\gr0Ts63.exe, PE32 37->131 dropped 133 C:\Users\user\AppData\Local\...\3TB61CD.exe, PE32 37->133 dropped 54 3TB61CD.exe 37->54         started        57 gr0Ts63.exe 1 4 37->57         started        249 Writes to foreign memory regions 40->249 251 Allocates memory in foreign processes 40->251 253 Injects a PE file into a foreign processes 40->253 60 AppLaunch.exe 4 40->60         started        195 77.91.124.1 ECOTEL-ASRU Russian Federation 43->195 135 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 43->135 dropped 137 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 43->137 dropped 255 Creates an undocumented autostart registry key 43->255 257 Uses schtasks.exe or at.exe to add and modify task schedules 43->257 71 3 other processes 43->71 63 Ry7cM4fL.exe 46->63         started        65 chrome.exe 46->65         started        197 192.168.2.4 unknown unknown 48->197 199 239.255.255.250 unknown Reserved 48->199 67 chrome.exe 48->67         started        73 2 other processes 48->73 69 chrome.exe 50->69         started        file15 signatures16 process17 dnsIp18 231 Writes to foreign memory regions 54->231 233 Allocates memory in foreign processes 54->233 235 Injects a PE file into a foreign processes 54->235 75 AppLaunch.exe 54->75         started        147 C:\Users\user\AppData\Local\...\2vT8436.exe, PE32 57->147 dropped 149 C:\Users\user\AppData\Local\...\1wl21TM0.exe, PE32 57->149 dropped 78 1wl21TM0.exe 57->78         started        80 2vT8436.exe 12 57->80         started        201 77.91.124.82 ECOTEL-ASRU Russian Federation 60->201 237 Found many strings related to Crypto-Wallets (likely being stolen) 60->237 239 Tries to harvest and steal browser information (history, passwords, etc) 60->239 83 chrome.exe 60->83         started        85 chrome.exe 60->85         started        151 C:\Users\user\AppData\Local\...\FU6HS0uT.exe, PE32 63->151 dropped 153 C:\Users\user\AppData\Local\...\5Ko91tP.exe, PE32 63->153 dropped 241 Antivirus detection for dropped file 63->241 243 Machine Learning detection for dropped file 63->243 87 FU6HS0uT.exe 63->87         started        203 49.124.12.0.in-addr.arpa 67->203 205 142.250.31.84 GOOGLEUS United States 67->205 207 27 other IPs or domains 67->207 90 conhost.exe 71->90         started        92 conhost.exe 71->92         started        94 6 other processes 71->94 file19 signatures20 process21 dnsIp22 259 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 75->259 261 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 75->261 263 Maps a DLL or memory area into another process 75->263 279 2 other signatures 75->279 96 explorer.exe 75->96 injected 265 Contains functionality to inject code into remote processes 78->265 267 Writes to foreign memory regions 78->267 269 Allocates memory in foreign processes 78->269 271 Injects a PE file into a foreign processes 78->271 101 AppLaunch.exe 9 1 78->101         started        175 5.42.92.88 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 80->175 273 Found many strings related to Crypto-Wallets (likely being stolen) 83->273 103 chrome.exe 83->103         started        143 C:\Users\user\AppData\Local\...\Ta3nL1nv.exe, PE32 87->143 dropped 145 C:\Users\user\AppData\Local\...\4rV650lX.exe, PE32 87->145 dropped 275 Antivirus detection for dropped file 87->275 277 Machine Learning detection for dropped file 87->277 105 Ta3nL1nv.exe 87->105         started        file23 signatures24 process25 dnsIp26 177 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 96->177 179 77.91.68.29 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 96->179 185 7 other IPs or domains 96->185 119 C:\Users\user\AppData\Local\Temp\B694.exe, PE32+ 96->119 dropped 121 C:\Users\user\AppData\Local\Temp\9908.exe, PE32 96->121 dropped 123 C:\Users\user\AppData\Local\Temp\88DB.exe, PE32+ 96->123 dropped 129 15 other files (14 malicious) 96->129 dropped 209 System process connects to network (likely due to code injection or exploit) 96->209 211 Benign windows process drops PE files 96->211 213 Hides that the sample has been downloaded from the Internet (zone.identifier) 96->213 107 110C.exe 96->107         started        111 backgroundTaskHost.exe 96->111         started        113 137E.exe 96->113         started        115 rundll32.exe 96->115         started        215 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 101->215 217 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 101->217 219 Modifies windows update settings 101->219 221 2 other signatures 101->221 181 142.250.31.104 GOOGLEUS United States 103->181 183 142.251.16.101 GOOGLEUS United States 103->183 187 4 other IPs or domains 103->187 125 C:\Users\user\AppData\Local\...\jN0xy2nm.exe, PE32 105->125 dropped 127 C:\Users\user\AppData\Local\...\3XA9Xq71.exe, PE32 105->127 dropped 117 jN0xy2nm.exe 105->117         started        file27 signatures28 process29 file30 155 C:\Users\user\AppData\Local\...\Ry7cM4fL.exe, PE32 107->155 dropped 157 C:\Users\user\AppData\Local\...\6RQ51nT.exe, PE32 107->157 dropped 281 Antivirus detection for dropped file 107->281 283 Machine Learning detection for dropped file 107->283 285 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 111->285 287 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 111->287 289 Multi AV Scanner detection for dropped file 113->289 159 C:\Users\user\AppData\Local\...\2qJ642Ld.exe, PE32 117->159 dropped 161 C:\Users\user\AppData\Local\...\1JE91vQ8.exe, PE32 117->161 dropped signatures31
Threat name:
Win32.Trojan.Nekark
Status:
Malicious
First seen:
2023-10-21 20:11:06 UTC
File Type:
PE (Exe)
Extracted files:
193
AV detection:
18 of 23 (78.26%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:asyncrat family:dcrat family:glupteba family:redline family:sectoprat family:smokeloader botnet:5141679758_99 botnet:default botnet:kolyan botnet:pixelscloud2.0 botnet:supera botnet:up3 botnet:yt&team cloud backdoor brand:google discovery dropper evasion infostealer loader persistence phishing rat spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies system certificate store
Runs net.exe
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
Windows security modification
Downloads MZ/PE file
Modifies Windows Firewall
Stops running service(s)
Async RAT payload
Amadey
AsyncRat
DcRat
Detected google phishing page
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.82:19071
http://77.91.124.1/theme/index.php
85.209.176.128:80
https://pastebin.com/raw/8baCJyMF
http://host-file-host6.com/
http://host-host-file8.com/
185.216.70.238:37515
89.23.100.93:4449
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
ffaa339d50dde34cb3afd501b339f451ef361ce61a5d4dd9d0ad8d351232da6c
MD5 hash:
61badea1f8a867d7782e21896c6694d9
SHA1 hash:
f6bba58d1386fe5b8576ea6042d0c05957a16af6
SH256 hash:
81d22a5a76354a2d98976371675ce9e30502d9420590ea9de9f82dc282eb8c2e
MD5 hash:
377102dd4ce350e2978522e0440a63e2
SHA1 hash:
a874745b0006a450e71857ea5dcaec056a6b7644
SH256 hash:
13a658a3b973c2094cee8024483b2d5de1a8a3836a7efe8d0606f4239f766340
MD5 hash:
cf7b5c629aff058e7ba1dea933038e53
SHA1 hash:
37772eea130d6a6bc71ddd0af35cfae578dd6fdf
Detections:
Amadey win_amadey_auto
SH256 hash:
5950bc250aea30acdbd275a5c615555bff8401d295d80feae8dedbb8b1957402
MD5 hash:
3b76e79518bbfaf98fa6a051c3b72020
SHA1 hash:
f30d3b25523eb799be9d2964184b228c03a10a68
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:mal_healer
Author:Nikos 'n0t' Totosis
Description:Payload disabling Windows AV
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:pe_no_import_table
Author:qux
Description:Detects exe does not have import table
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments