MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5b77e331ff166d24ccaf781b84705bb6afcceaaa708024d54efc2a10f515c32a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 7 YARA 8 File information Comments

SHA256 hash: 5b77e331ff166d24ccaf781b84705bb6afcceaaa708024d54efc2a10f515c32a
SHA3-384 hash: ea958356dfe33d6c1aa7530aa8414e9f3af0c8cca54e251b826fd2343094b342a42a4feaaf90ef14cd6fd55f5e621992
SHA1 hash: b003a86573fa1d62584f27081aa8de5029e495e1
MD5 hash: a751d63055d095450ccf41ecad484077
humanhash: hot-bluebird-carpet-maine
File name:a751d63055d095450ccf41ecad484077.exe
Download: download sample
Signature RedLineStealer
File size:14'260'880 bytes
First seen:2021-11-19 13:45:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 393216:Jhp3RLAlqgymE3o2ci4V7j5iiGtagidre+8oR4:JhFRCtxE34VV7XG0gidrejl
Threatray 707 similar samples on MalwareBazaar
TLSH T13EE633073A33E568E709B6BC441CD004B67B7A6B517869CFD21BF5B99C6BC254A38383
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
91.243.59.56:61911

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
91.243.59.56:61911 https://threatfox.abuse.ch/ioc/250728/
45.129.99.148:80 https://threatfox.abuse.ch/ioc/251027/
91.208.127.220:35763 https://threatfox.abuse.ch/ioc/251028/
185.92.150.136:7303 https://threatfox.abuse.ch/ioc/251029/
51.68.142.233:31156 https://threatfox.abuse.ch/ioc/251030/
185.92.74.51:2378 https://threatfox.abuse.ch/ioc/251031/
146.185.239.5:80 https://threatfox.abuse.ch/ioc/251032/

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a751d63055d095450ccf41ecad484077.exe
Verdict:
No threats detected
Analysis date:
2021-11-19 13:48:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Launching a process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Generic malware Amadey Metasploit RedLin
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Yara detected Amadey bot
Yara detected Metasploit Payload
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 525146 Sample: fXlJhe5OGb.exe Startdate: 19/11/2021 Architecture: WINDOWS Score: 100 65 194.195.211.98 NEXINTO-DE Germany 2->65 67 45.144.225.243, 49776, 49789, 49798 DEDIPATH-LLCUS Netherlands 2->67 69 16 other IPs or domains 2->69 87 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->87 89 Antivirus detection for URL or domain 2->89 91 Antivirus detection for dropped file 2->91 93 25 other signatures 2->93 11 fXlJhe5OGb.exe 10 2->11         started        signatures3 process4 file5 55 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->55 dropped 14 setup_installer.exe 22 11->14         started        process6 file7 57 C:\Users\user\AppData\...\setup_install.exe, PE32 14->57 dropped 59 C:\Users\user\AppData\...\Mon22ef09abdc.exe, PE32 14->59 dropped 61 C:\Users\user\...\Mon22c846f022dc5a0.exe, PE32 14->61 dropped 63 17 other files (11 malicious) 14->63 dropped 17 setup_install.exe 1 14->17         started        process8 signatures9 83 Adds a directory exclusion to Windows Defender 17->83 85 Disables Windows Defender (via service or powershell) 17->85 20 cmd.exe 17->20         started        22 cmd.exe 17->22         started        24 cmd.exe 17->24         started        26 11 other processes 17->26 process10 signatures11 29 Mon22069c5d6c59dd9a.exe 20->29         started        32 Mon2239127d69.exe 22->32         started        35 Mon221be9cc2d.exe 24->35         started        95 Adds a directory exclusion to Windows Defender 26->95 97 Disables Windows Defender (via service or powershell) 26->97 37 Mon22ef09abdc.exe 26->37         started        39 Mon2246247f54.exe 26->39         started        42 Mon221ccf3dbaf.exe 26->42         started        44 6 other processes 26->44 process12 dnsIp13 99 Multi AV Scanner detection for dropped file 29->99 101 Detected unpacking (changes PE section rights) 29->101 103 Machine Learning detection for dropped file 29->103 117 4 other signatures 29->117 49 C:\Users\user\AppData\Local\...\tkools.exe, PE32 32->49 dropped 105 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 32->105 107 Tries to detect virtualization through RDTSC time measurements 32->107 51 C:\Users\user\AppData\...\Mon221be9cc2d.tmp, PE32 35->51 dropped 109 Obfuscated command line found 35->109 111 Injects a PE file into a foreign processes 37->111 46 Mon22ef09abdc.exe 37->46         started        71 iplogger.org 5.9.162.45, 443, 49765, 49773 HETZNER-ASDE Germany 39->71 73 www.listincode.com 149.28.253.196, 443, 49764 AS-CHOOPAUS United States 39->73 75 192.168.2.1 unknown unknown 39->75 113 May check the online IP address of the machine 39->113 77 webdeadshare24.me 172.67.194.252, 443, 49766, 49767 CLOUDFLARENETUS United States 42->77 79 cdn.discordapp.com 162.159.135.233, 443, 49777, 49788 CLOUDFLARENETUS United States 44->79 53 C:\Users\user\...\Mon2234cdb458c91b79.tmp, PE32 44->53 dropped 115 Antivirus detection for dropped file 44->115 file14 signatures15 process16 dnsIp17 81 g-localdevice.biz 46->81
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2021-11-16 10:10:34 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:metasploit family:raccoon family:redline family:smokeloader family:socelars family:vidar botnet:937 aspackv2 backdoor infostealer stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Amadey
MetaSploit
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.gianninidesign.com/
http://membro.at/upload/
http://jeevanpunetha.com/upload/
http://misipu.cn/upload/
http://zavodooo.ru/upload/
http://targiko.ru/upload/
http://vues3d.com/upload/
https://mastodon.online/@valhalla
https://koyu.space/@valhalla
Unpacked files
SH256 hash:
152e12547ca933b021d0f1c04474b72b74e50983548d965c2eeac398c0a84d6c
MD5 hash:
d98fccb15197651fe8f2f823acf2c85c
SHA1 hash:
5a79a53acb83e5b330ca05798e3639c01e29e03e
SH256 hash:
73f7d9bcdb5dccf82b324c3f5384de3240d4feff887a1c929a9174beb55194ce
MD5 hash:
5500d82a7c8e8ee2b1cee17749c0bc70
SHA1 hash:
9b831c0c04732453b3a28f1278d5ae047cdd1e53
SH256 hash:
265014beccca0795fab860ff9b2b9931cf5b320ffb64d3faf450f5df01094ec2
MD5 hash:
bcfcdb6ed728cad8f743059b7aca77c6
SHA1 hash:
02e1a3b238d084c1e0935f93f87d7f9194b19e75
SH256 hash:
4feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
MD5 hash:
ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1 hash:
f61d31d176ba67cfff4f0cab04b4b2d19df91684
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
1bbf1271ce5c9dc20b595fdf1f516166f65b443599fc835607008666296983ff
MD5 hash:
49fc2ee06ab4c4b533cf9ce484c02adf
SHA1 hash:
b90f22613578232b8bf377377ea5c4d84b37b0a7
Detections:
win_zloader_g1
Parent samples :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 hash:
188da30341680680a23d42b909c202a6c0cc2acaec2df51a8c6eef9773f25088
MD5 hash:
d1b9b90bbab7ddd72d53bfd54431491f
SHA1 hash:
b15550cf6bebcf1f6c9b51bc930b2c4d1e4814a3
SH256 hash:
a4591880fbc4eabb75d8490a17cdf32d22f18106b051995c126fba7a9d61cfbb
MD5 hash:
8ef79bf713ca0324c60ab291d6237673
SHA1 hash:
ff64f1c2cfaf7fe54bb6b29104067fed191b1da3
SH256 hash:
b04c2c3f908877ee59ca0c14bec8e30d1ef953dc7b544abcc2b5f6e20cd0c3c5
MD5 hash:
2ef4072c7a43a768df9cb1770e3f0070
SHA1 hash:
e75bea2b9aac68a707066f0b59e8c98b9d824bb1
SH256 hash:
55f67e339539dda0ba91a22be52126bdb6af7934f1a67d1443a5dc8d0ee0cb4f
MD5 hash:
ec2018e68678b796ed73137dcd6a614e
SHA1 hash:
e0609df7232f675358cdd1437d7cd4b9a2ede057
SH256 hash:
806b76af1def31ef65688500f66c420bf0f7f6e744bff7854afe3372fec201e4
MD5 hash:
57052d1781641f0bebfa2e688b764a62
SHA1 hash:
ba8e2755f8fc18add9b423b37a28695e7c946e04
SH256 hash:
544e67e044dafbf651dc08606d63ab2718024c986ab7e0e403246a1e3f32eb87
MD5 hash:
c084fd0820b600f3617d8d91e03fc88b
SHA1 hash:
ba1bdcd94e02b887d0911e5604ce0c8d13c026af
SH256 hash:
36b17c61219d6b9e72d4bc290322b6be39598bd392021bc041017d9d1bc2116c
MD5 hash:
dfcfcac6468fda4717531363696a1e7e
SHA1 hash:
82a3c5f2e5b52f949ed645537e9e95b755825286
SH256 hash:
d53f232a7a4edac855388356d3b94f7718b3616826670e2bf59a4cf742c86482
MD5 hash:
43685d3c9b89d736d9e44a349700dcc3
SHA1 hash:
71aaa4c8a92a68c53b6ed3eb75edf8226769c7c0
SH256 hash:
368acf4acccc18cf47d61a152b6d4d9cf663e088a1e9944a518a80825db73d92
MD5 hash:
e9bcac23bfaa5543725a24aa0e4e651f
SHA1 hash:
6f0c806aa6643a111a81d8ee3f7aa65aeec4cd7d
SH256 hash:
2cd83776ac76a793efc94506519a21bf7e99dba652c4937de1544fbde48398cb
MD5 hash:
c42c7a83e4342f62acb235017ec5f1e4
SHA1 hash:
4eb233e142f7beea94529f731a7d78ec5bba8056
SH256 hash:
f1c467e091505308b0a1d06214efdb8040b75625205c628b301f684ff4f72683
MD5 hash:
cf331e904d5e3484e697503d9dd56aab
SHA1 hash:
c36eb706494218d29802047e7217bf9e9aa732fb
SH256 hash:
fd3467342ea89580344fa1096dd44b9a11dee3310298ba19a9225f56279a7ea4
MD5 hash:
9b9baf68a21a33248994efc9f48d644e
SHA1 hash:
06b714302251537dada4038a424b7022ecb3b7f7
SH256 hash:
93c4cba30e4e919db036ca03b25885094ff34caf6a52125dc5647c16c454e700
MD5 hash:
f0380d884cef856b846e2128714e63be
SHA1 hash:
a51466452c7ad1b604335cfcf00f6547ba326dfb
SH256 hash:
30d369a9d1553b6cf933a41325e6e3c7a6d8e153f1d33abb7bed65df2e089398
MD5 hash:
4c88171cc084b7ed9a7c40bf1878ada7
SHA1 hash:
433cbaffa070d149025b65ebacf24564bedbcb13
SH256 hash:
6a9b6e5c55581851ee160b6a134a32b1ac48a8023df6144a49c8d40c6e332da4
MD5 hash:
de23e6bad1d0e24a9e13b7b73e19b268
SHA1 hash:
7cfebb571affe1a248632cbf55fd967f9c83e51e
SH256 hash:
7a353ce95041a4164e5dc77b36c509a2f0446742ec25e30eee026e6f1375a843
MD5 hash:
8e68a87564b3a65cb50592ff830432ce
SHA1 hash:
f664f09d8777e1a5a210adeca48d4a6370870254
SH256 hash:
dd76bcd6102e47cf856e17b5f946e757f385e75da2fda05bed4e9f7bcb353221
MD5 hash:
2b2aa30148cd944a7d8bc3647c81abf7
SHA1 hash:
8a8e5bd4c557f6aa395c3fe9f394a1aead1e3ed6
SH256 hash:
6ea1e2e384d9ccf28a8e1153d33a13e8a328720699d952cac674a4ed8559e15f
MD5 hash:
48ad68f5c61489d194750174cc1a904a
SHA1 hash:
81c39792f2052f5a86fafebfb49a96b3d77f7ed6
SH256 hash:
67898ae136d2d9dc0225bc77311165a172b8de753c51e89672caf21f48a97a80
MD5 hash:
5f06a03d0abedbf3a6670027321f45fb
SHA1 hash:
cba46e9ef2e3eddef94a4129422f653b5a9067ae
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
ceefb2821e5a4615dacfd4d89f5c3b020487b7ddf3b5d46f1604a608a9de59dc
MD5 hash:
e6ef3606321b02ca0df8ba98f6edcff6
SHA1 hash:
822183fec4212f23f07686aa08201e4dcc1fed93
SH256 hash:
5b77e331ff166d24ccaf781b84705bb6afcceaaa708024d54efc2a10f515c32a
MD5 hash:
a751d63055d095450ccf41ecad484077
SHA1 hash:
b003a86573fa1d62584f27081aa8de5029e495e1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments