MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5dcf34f35a1874d190c81c7197785c4f4f9305842918fc70fe9d912040978422. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 1 File information Comments

SHA256 hash: 5dcf34f35a1874d190c81c7197785c4f4f9305842918fc70fe9d912040978422
SHA3-384 hash: 7c2fcc6e6e7709c5f0b2f7f875e41f2c97b8ef8423c0ebb9db268f8445d9c5e0107b0d5e66afb110dc7fcff4c756a99b
SHA1 hash: 70c4dedb69612151bf670ac12d73373db8227b1b
MD5 hash: ce4b358d37051ea1c94278239faae503
humanhash: potato-sixteen-timing-oklahoma
File name:5DCF34F35A1874D190C81C7197785C4F4F9305842918F.exe
Download: download sample
Signature RedLineStealer
File size:319'488 bytes
First seen:2022-06-29 17:12:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 8384a97d22d1e307b8692493c7d1a249 (1 x RedLineStealer)
ssdeep 6144:WJ6orYUHrlcb7wK2+l2PnPoeR78IrE69ERgEsEz:86rULlcb7w4cv7OQ4s
TLSH T1DF64BF10BBA0D035E1F721F4497A93A9B53E7EF1AB2450CB22D52AEE56346D0EC3075B
TrID 40.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
17.0% (.SCR) Windows screen saver (13101/52/3)
13.6% (.EXE) Win64 Executable (generic) (10523/12/4)
8.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon b2dacabecee6baa6 (148 x RedLineStealer, 145 x Stop, 100 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
87.251.76.137:81

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
87.251.76.137:81 https://threatfox.abuse.ch/ioc/736433/

Intelligence


File Origin
# of uploads :
1
# of downloads :
221
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Сreating synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Blocking the Windows Defender launch
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
CPUID_Instruction
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses whoami command line tool to query computer and username
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 654580 Sample: 5DCF34F35A1874D190C81C71977... Startdate: 29/06/2022 Architecture: WINDOWS Score: 100 47 Snort IDS alert for network traffic 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 Antivirus detection for URL or domain 2->51 53 8 other signatures 2->53 7 5DCF34F35A1874D190C81C7197785C4F4F9305842918F.exe 4 20 2->7         started        process3 dnsIp4 35 212.193.30.45, 49721, 80 SPD-NETTR Russian Federation 7->35 37 85.202.169.116, 49722, 49735, 49736 GUDAEV-ASRU Netherlands 7->37 39 4 other IPs or domains 7->39 25 C:\Users\...\CwkhUuOu7zydOyEKMnFya6NZ.exe, PE32 7->25 dropped 55 Detected unpacking (changes PE section rights) 7->55 57 Detected unpacking (creates a PE file in dynamic memory) 7->57 59 Detected unpacking (overwrites its own PE header) 7->59 61 4 other signatures 7->61 12 CwkhUuOu7zydOyEKMnFya6NZ.exe 49 7->12         started        17 cmd.exe 1 7->17         started        file5 signatures6 process7 dnsIp8 41 neo-files.com 31.31.196.98, 443, 49741, 49749 AS-REGRU Russian Federation 12->41 43 ipinfo.io 12->43 45 cdn.discordapp.com 12->45 27 C:\Users\user\AppData\...\libcrypto-3.dll, PE32 12->27 dropped 29 C:\Users\user\AppData\...\vcruntime140.dll, PE32 12->29 dropped 31 C:\Users\user\AppData\Local\...\softokn3.dll, PE32 12->31 dropped 33 4 other files (none is malicious) 12->33 dropped 63 Tries to steal Mail credentials (via file / registry access) 12->63 65 Tries to harvest and steal browser information (history, passwords, etc) 12->65 19 conhost.exe 12->19         started        67 Uses whoami command line tool to query computer and username 17->67 21 conhost.exe 17->21         started        23 whoami.exe 1 17->23         started        file9 signatures10 process11
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-04-20 23:51:52 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
25 of 26 (96.15%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:djvu family:nymaim family:vidar botnet:1448 botnet:937 discovery evasion ransomware spyware stealer suricata trojan upx vmprotect
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Program crash
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Vidar Stealer
Detected Djvu ransomware
Djvu Ransomware
Modifies Windows Defender Real-time Protection settings
NyMaim
Vidar
suricata: ET MALWARE Vidar/Arkei/Megumin Stealer Keywords Retrieved
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Malware Config
C2 Extraction:
45.141.237.3
31.210.20.149
212.192.241.16
http://acacaca.org/test3/get.php
https://t.me/ch_inagroup
https://mastodon.social/@olegf9844e
Unpacked files
SH256 hash:
a9f192acd77eee582631f67fa02d5cebe014796f31e99469c62895c95cb3fe81
MD5 hash:
0f8f7d432e6c67310dbf5678e99d22fb
SHA1 hash:
666d4bb7ec7c2e654d7d78a32cea607383feca49
SH256 hash:
5dcf34f35a1874d190c81c7197785c4f4f9305842918fc70fe9d912040978422
MD5 hash:
ce4b358d37051ea1c94278239faae503
SHA1 hash:
70c4dedb69612151bf670ac12d73373db8227b1b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments