MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 603f6820ab27891bd9d355fbe8e0502d337b90a81c6398ceea83d6a1f7445200. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 603f6820ab27891bd9d355fbe8e0502d337b90a81c6398ceea83d6a1f7445200
SHA3-384 hash: b20b722e177380966577b3c41dcb6aa1995e3ec8056f38d54de541a4201ab3e113a5168a4297702301c8f81b7c8404dc
SHA1 hash: 99985d5c162e2dae4ca6018f3e8c5f7173d4087e
MD5 hash: b8353e9fd91ec7be31102f7546d8bf43
humanhash: arkansas-speaker-happy-zulu
File name:file
Download: download sample
Signature RedLineStealer
File size:371'712 bytes
First seen:2022-10-01 13:42:25 UTC
Last seen:2022-10-02 14:03:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash be5ae06d3f8e175d846d86ef315f2871 (1 x RedLineStealer)
ssdeep 6144:k8olEWcFXHGZQndztBWfLJORcPR8mWrAObeLTgGdNk5Pa3hH2OtQRmd24jXv/H:voavFXmundztkNMVeQmu5Pa51w4L
Threatray 243 similar samples on MalwareBazaar
TLSH T15E84BF013491C432ED7351324DF9EF7C0B2FB9604BA989EB67941BAE4F351E2E632426
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from https://vk.com/doc527785675_645247978?hash=sAuCeZV8D0JeQjgkF64cznd4FDXWd40MOzFxzVf3Qfo&dl=GUZDONZYGU3DONI:1664630772:SZOk2a42DQSH3ZScqVa9zo6WCH9Ux0FuxpZVkKZAGQ8&api=1&no_preview=1#1

Intelligence


File Origin
# of uploads :
660
# of downloads :
350
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
socelars
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2022-10-02 01:21:47 UTC
Tags:
opendir evasion trojan socelars stealer rat redline loader raccoon recordbreaker

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the system32 subdirectories
Creating a file
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
GRQ Scam, Raccoon Stealer v2, RedLine
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Potential malicious VBS script found (suspicious strings)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected GRQ Scam
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 714109 Sample: file.exe Startdate: 01/10/2022 Architecture: WINDOWS Score: 100 139 dba692117be7b6d3480fe5220fdd58b38bf.xyz 2->139 141 transfer.sh 2->141 143 2 other IPs or domains 2->143 175 Snort IDS alert for network traffic 2->175 177 Multi AV Scanner detection for domain / URL 2->177 179 Malicious sample detected (through community Yara rule) 2->179 181 12 other signatures 2->181 15 file.exe 1 2->15         started        18 MoUSO.exe 2->18         started        signatures3 process4 signatures5 247 Contains functionality to inject code into remote processes 15->247 249 Writes to foreign memory regions 15->249 251 Allocates memory in foreign processes 15->251 253 Injects a PE file into a foreign processes 15->253 20 RegSvcs.exe 18 20 15->20         started        25 WerFault.exe 23 9 15->25         started        27 conhost.exe 15->27         started        255 Antivirus detection for dropped file 18->255 257 Multi AV Scanner detection for dropped file 18->257 259 Machine Learning detection for dropped file 18->259 261 3 other signatures 18->261 process6 dnsIp7 145 51.89.201.21, 49706, 7161 OVHFR France 20->145 147 transfer.sh 144.76.136.153, 443, 49707, 49715 HETZNER-ASDE Germany 20->147 111 C:\Users\user\AppData\Local\Temp\setup.exe, PE32+ 20->111 dropped 215 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->215 217 Potential malicious VBS script found (suspicious strings) 20->217 219 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 20->219 221 2 other signatures 20->221 29 setup.exe 1 20->29         started        32 wscript.exe 20->32         started        35 chrome.exe 17 1 20->35         started        149 192.168.2.1 unknown unknown 25->149 113 C:\ProgramData\Microsoft\...\Report.wer, Unicode 25->113 dropped file8 signatures9 process10 dnsIp11 223 Hijacks the control flow in another process 29->223 225 Writes to foreign memory regions 29->225 227 Allocates memory in foreign processes 29->227 231 2 other signatures 29->231 37 RegSvcs.exe 29->37         started        41 conhost.exe 29->41         started        135 iplogger.org 148.251.234.83, 443, 49748, 49796 HETZNER-ASDE Germany 32->135 229 System process connects to network (likely due to code injection or exploit) 32->229 43 RegSvcs.exe 32->43         started        45 conhost.exe 32->45         started        137 239.255.255.250 unknown Reserved 35->137 47 chrome.exe 35->47         started        49 chrome.exe 35->49         started        signatures12 process13 dnsIp14 151 cdn.discordapp.com 162.159.135.233, 443, 49749, 49779 CLOUDFLARENETUS United States 37->151 153 transfer.sh 37->153 123 C:\Users\user\AppData\Local\Temp\setup2.exe, PE32 37->123 dropped 125 C:\Users\user\AppData\Local\Temp\setup1.exe, PE32 37->125 dropped 127 C:\Users\user\AppData\Local\...\546[1].exe, PE32+ 37->127 dropped 129 C:\Users\user\AppData\Local\...\12[1].exe, PE32 37->129 dropped 51 setup.exe 37->51         started        54 setup1.exe 37->54         started        58 setup2.exe 37->58         started        60 setup.exe 43->60         started        155 115.hadfaroi.live 54.37.5.34, 443, 49714, 49716 OVHFR France 47->155 157 www.google.com 142.250.203.100, 443, 49727, 49801 GOOGLEUS United States 47->157 159 7 other IPs or domains 47->159 file15 process16 dnsIp17 183 Hijacks the control flow in another process 51->183 185 Writes to foreign memory regions 51->185 187 Allocates memory in foreign processes 51->187 62 RegSvcs.exe 51->62         started        65 conhost.exe 51->65         started        161 dba692117be7b6d3480fe5220fdd58b38bf.xyz 104.21.17.54, 443, 49793, 49794 CLOUDFLARENETUS United States 54->161 131 C:\Users\user\AppData\Local\cache\MoUSO.exe, PE32 54->131 dropped 189 Antivirus detection for dropped file 54->189 191 Multi AV Scanner detection for dropped file 54->191 193 Detected unpacking (changes PE section rights) 54->193 201 10 other signatures 54->201 67 schtasks.exe 54->67         started        133 C:\Windows\Temp\reki8vaui.exe, PE32 58->133 dropped 195 Potential malicious VBS script found (suspicious strings) 58->195 69 reki8vaui.exe 58->69         started        72 wscript.exe 58->72         started        197 Modifies the context of a thread in another process (thread injection) 60->197 199 Injects a PE file into a foreign processes 60->199 74 conhost.exe 60->74         started        76 RegSvcs.exe 60->76         started        file18 signatures19 process20 dnsIp21 169 transfer.sh 62->169 78 setup.exe 62->78         started        81 setup1.exe 62->81         started        83 setup2.exe 62->83         started        85 conhost.exe 67->85         started        171 135.148.104.11, 49799, 80 AVAYAUS United States 69->171 115 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 69->115 dropped 117 C:\Users\user\AppData\LocalLow\softokn3.dll, PE32 69->117 dropped 119 C:\Users\user\AppData\LocalLow\nss3.dll, PE32 69->119 dropped 121 4 other files (2 malicious) 69->121 dropped 87 conhost.exe 69->87         started        173 iplogger.org 72->173 file22 process23 signatures24 233 Hijacks the control flow in another process 78->233 235 Writes to foreign memory regions 78->235 237 Allocates memory in foreign processes 78->237 243 2 other signatures 78->243 89 RegSvcs.exe 78->89         started        92 conhost.exe 78->92         started        239 Hides threads from debuggers 81->239 241 Tries to detect sandboxes / dynamic malware analysis system (registry check) 81->241 94 wscript.exe 83->94         started        97 reki8vaui.exe 83->97         started        process25 dnsIp26 165 transfer.sh 89->165 99 setup.exe 89->99         started        102 setup1.exe 89->102         started        105 setup2.exe 89->105         started        167 iplogger.org 94->167 245 System process connects to network (likely due to code injection or exploit) 94->245 107 conhost.exe 97->107         started        signatures27 process28 dnsIp29 203 Hijacks the control flow in another process 99->203 205 Writes to foreign memory regions 99->205 207 Allocates memory in foreign processes 99->207 213 2 other signatures 99->213 163 dba692117be7b6d3480fe5220fdd58b38bf.xyz 102->163 209 Hides threads from debuggers 102->209 211 Tries to detect sandboxes / dynamic malware analysis system (registry check) 102->211 109 schtasks.exe 102->109         started        signatures30 process31
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2022-10-01 13:43:06 UTC
File Type:
PE (Exe)
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
603f6820ab27891bd9d355fbe8e0502d337b90a81c6398ceea83d6a1f7445200
MD5 hash:
b8353e9fd91ec7be31102f7546d8bf43
SHA1 hash:
99985d5c162e2dae4ca6018f3e8c5f7173d4087e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments