MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5fd7e3ad5c9088c5b2d86d5751ad2e727006ab32ad9345bf6101bba6610117ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 6 File information Comments

SHA256 hash: 5fd7e3ad5c9088c5b2d86d5751ad2e727006ab32ad9345bf6101bba6610117ee
SHA3-384 hash: 65e12eea185ab722af8c0ba7c130f24fc1ee8dfd7c165c9a5f2601968fa7c179f7b9da0adf2fb979c1af1365f6bf8ebe
SHA1 hash: 0a8cecbf8a0a7bf1fb903b08605739e77f1b353c
MD5 hash: b35d6c2090048a6fe2c4e5a0834713e6
humanhash: five-virginia-comet-two
File name:Wire confirmation.scr.exe
Download: download sample
Signature RedLineStealer
File size:32'544 bytes
First seen:2021-06-28 21:50:34 UTC
Last seen:2021-06-28 22:38:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'659 x AgentTesla, 19'469 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 768:cuYxQZ6++hIduJJ1U1NCOLtuEYzob6vWccgcccI5BrZIYaF/kgWzC747/SPD4uCS:cuYxQZ6++hIduJJ1U1NCOLtuEYzob6vG
Threatray 330 similar samples on MalwareBazaar
TLSH 8CE26E069B4405BEE00ED93FE3D28531DF329B9F7A25EC896D7E92FB06152830598B1D
Reporter James_inthe_box
Tags:exe RedLineStealer signed

Code Signing Certificate

Organisation:33adab6a2ixdac07i4cLb4ac05j6yG2ew95e
Issuer:33adab6a2ixdac07i4cLb4ac05j6yG2ew95e
Algorithm:sha256WithRSAEncryption
Valid from:2021-06-28T10:31:19Z
Valid to:2022-06-28T10:31:19Z
Serial number: 5dd1cb148a90123dcc13498b54e5a798
Thumbprint Algorithm:SHA256
Thumbprint: bc8b855f0fc2933179303a583d1c32a7b51f4a0b758e419b891b4d543546c26e
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
101
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Wire confirmation.scr.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-28 21:54:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
adwa.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Contains functionality to inject code into remote processes
Creates an autostart registry key pointing to binary in C:\Windows
Drops executables to the windows directory (C:\Windows) and starts them
Drops PE files to the startup folder
Drops PE files with benign system names
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell adding suspicious path to exclusion list
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 441444 Sample: Wire confirmation.scr.exe Startdate: 28/06/2021 Architecture: WINDOWS Score: 100 104 Multi AV Scanner detection for dropped file 2->104 106 Sigma detected: Powershell adding suspicious path to exclusion list 2->106 108 Multi AV Scanner detection for submitted file 2->108 110 8 other signatures 2->110 10 Wire confirmation.scr.exe 15 4 2->10         started        15 svchost.exe 2->15         started        17 svchost.exe 2->17         started        19 5 other processes 2->19 process3 dnsIp4 102 kakosidobrosam.gq 104.21.67.197, 443, 49750 CLOUDFLARENETUS United States 10->102 98 C:\Users\...\Wire confirmation.scr.exe.log, ASCII 10->98 dropped 118 Injects a PE file into a foreign processes 10->118 21 Wire confirmation.scr.exe 9 13 10->21         started        120 Multi AV Scanner detection for dropped file 15->120 122 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->122 25 svchost.exe 15->25         started        124 Drops executables to the windows directory (C:\Windows) and starts them 17->124 27 svchost.exe 17->27         started        29 b2085827di9ag4HQHe2BJ34nY.exe 19->29         started        file5 signatures6 process7 file8 80 C:\Windows\Resources\Themes\...\svchost.exe, PE32 21->80 dropped 82 C:\Users\...\b2085827di9ag4HQHe2BJ34nY.exe, PE32 21->82 dropped 84 C:\Windows\...\svchost.exe:Zone.Identifier, ASCII 21->84 dropped 92 3 other files (1 malicious) 21->92 dropped 112 Creates an autostart registry key pointing to binary in C:\Windows 21->112 114 Adds a directory exclusion to Windows Defender 21->114 31 b2085827di9ag4HQHe2BJ34nY.exe 21->31         started        34 powershell.exe 21->34         started        36 AdvancedRun.exe 1 21->36         started        40 8 other processes 21->40 86 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 25->86 dropped 88 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 27->88 dropped 90 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 29->90 dropped 38 AdvancedRun.exe 29->38         started        signatures9 process10 signatures11 128 Injects a PE file into a foreign processes 31->128 42 b2085827di9ag4HQHe2BJ34nY.exe 31->42         started        130 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 34->130 46 conhost.exe 34->46         started        48 AdvancedRun.exe 36->48         started        51 AdvancedRun.exe 38->51         started        53 conhost.exe 40->53         started        55 conhost.exe 40->55         started        57 conhost.exe 40->57         started        59 5 other processes 40->59 process12 dnsIp13 94 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 42->94 dropped 96 9a33d54d-e86c-4447-94d3-72b1131b7788.exe, PE32 42->96 dropped 116 Adds a directory exclusion to Windows Defender 42->116 61 powershell.exe 42->61         started        64 AdvancedRun.exe 42->64         started        66 powershell.exe 42->66         started        68 3 other processes 42->68 100 192.168.2.1 unknown unknown 48->100 file14 signatures15 process16 signatures17 126 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 61->126 70 conhost.exe 61->70         started        72 AdvancedRun.exe 64->72         started        74 conhost.exe 66->74         started        76 conhost.exe 68->76         started        78 conhost.exe 68->78         started        process18
Threat name:
ByteCode-MSIL.Trojan.Pwsx
Status:
Malicious
First seen:
2021-06-28 15:16:10 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
12 of 29 (41.38%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Maps connected drives based on registry
Checks BIOS information in registry
Drops startup file
Loads dropped DLL
Windows security modification
Executes dropped EXE
Looks for VMWare Tools registry key
Looks for VirtualBox Guest Additions in registry
Nirsoft
Modifies Windows Defender Real-time Protection settings
Turns off Windows Defender SpyNet reporting
UAC bypass
Windows security bypass
Unpacked files
SH256 hash:
5fd7e3ad5c9088c5b2d86d5751ad2e727006ab32ad9345bf6101bba6610117ee
MD5 hash:
b35d6c2090048a6fe2c4e5a0834713e6
SHA1 hash:
0a8cecbf8a0a7bf1fb903b08605739e77f1b353c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD
Author:ditekSHen
Description:Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments