MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 63301a39b93b63acab80e0a05b909f733d792c7ae829a0a207d2fa2e1498158f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 6 YARA 13 File information Comments

SHA256 hash: 63301a39b93b63acab80e0a05b909f733d792c7ae829a0a207d2fa2e1498158f
SHA3-384 hash: c7316d29dd2772034b3e44a965726ae90a78ee42a15628a86e8999693cbd8f390689be0ab17bf7c25b39aa3e88e21023
SHA1 hash: b427830c72004be17918c628918b8fc2ca2d43d1
MD5 hash: 32df2eb9a83b1a97096aa403b6e5ce3f
humanhash: eleven-four-speaker-blossom
File name:63301A39B93B63ACAB80E0A05B909F733D792C7AE829A.exe
Download: download sample
Signature RedLineStealer
File size:3'243'908 bytes
First seen:2021-09-30 23:25:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:x4Xxj+HYhn7fJmRwFZ7oHIDVhGsdCvLUBsKShZ:x4Xxj+HYh7fAyoHKVhGs+LUCK4Z
Threatray 255 similar samples on MalwareBazaar
TLSH T132E5336433D2C1BBEB504034DE94BFB1A6FAC36816168D6B7394DE0C5F3C940AA2762D
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
37.230.112.47:49799

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
37.230.112.47:49799 https://threatfox.abuse.ch/ioc/228889/
http://94.158.245.135/ https://threatfox.abuse.ch/ioc/229045/
45.131.46.129:12509 https://threatfox.abuse.ch/ioc/229046/
185.154.13.159:34854 https://threatfox.abuse.ch/ioc/229048/
188.72.208.174:38430 https://threatfox.abuse.ch/ioc/229066/
185.132.134.148:55353 https://threatfox.abuse.ch/ioc/229068/

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
63301A39B93B63ACAB80E0A05B909F733D792C7AE829A.exe
Verdict:
No threats detected
Analysis date:
2021-09-30 23:31:59 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Result
Threat name:
RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code contains very large strings
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 494786 Sample: 63301A39B93B63ACAB80E0A05B9... Startdate: 01/10/2021 Architecture: WINDOWS Score: 100 105 email.yg9.me 2->105 107 zukicv06.top 2->107 109 29 other IPs or domains 2->109 153 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->153 155 Antivirus detection for URL or domain 2->155 157 Antivirus detection for dropped file 2->157 163 14 other signatures 2->163 12 63301A39B93B63ACAB80E0A05B909F733D792C7AE829A.exe 15 2->12         started        signatures3 159 May check the online IP address of the machine 105->159 161 Performs DNS queries to domains with low reputation 107->161 process4 file5 81 C:\Users\user\AppData\Local\...\sotema_1.txt, PE32 12->81 dropped 83 C:\Users\user\AppData\...\setup_install.exe, PE32 12->83 dropped 85 C:\Users\user\AppData\Local\...\sotema_7.txt, PE32 12->85 dropped 87 10 other files (none is malicious) 12->87 dropped 15 setup_install.exe 1 12->15         started        process6 dnsIp7 145 razino.xyz 192.64.119.193, 49764, 80 NAMECHEAP-NETUS United States 15->145 147 127.0.0.1 unknown unknown 15->147 73 C:\Users\user\AppData\...\sotema_7.exe (copy), PE32 15->73 dropped 75 C:\Users\user\AppData\...\sotema_6.exe (copy), PE32 15->75 dropped 77 C:\Users\user\AppData\...\sotema_5.exe (copy), PE32 15->77 dropped 79 4 other files (2 malicious) 15->79 dropped 149 Detected unpacking (changes PE section rights) 15->149 151 Performs DNS queries to domains with low reputation 15->151 20 cmd.exe 1 15->20         started        22 cmd.exe 1 15->22         started        24 cmd.exe 1 15->24         started        26 5 other processes 15->26 file8 signatures9 process10 process11 28 sotema_6.exe 20->28         started        33 sotema_2.exe 1 22->33         started        35 sotema_1.exe 5 24->35         started        37 sotema_4.exe 1 26->37         started        39 sotema_7.exe 26->39         started        41 sotema_5.exe 26->41         started        43 sotema_3.exe 12 26->43         started        dnsIp12 117 37.0.8.119, 49790, 80 WKD-ASIE Netherlands 28->117 119 136.144.41.133, 80 WORLDSTREAMNL Netherlands 28->119 123 12 other IPs or domains 28->123 89 C:\Users\...\sYHS1FvP7OWqzUw5hZnYM09Y.exe, PE32 28->89 dropped 91 C:\Users\...\iCRQtJZ15CtyaFQSMYCt8pMz.exe, PE32 28->91 dropped 93 C:\Users\...\gPXJ7sUIcI6n3IbkCssWlioa.exe, PE32 28->93 dropped 101 29 other files (24 malicious) 28->101 dropped 181 Drops PE files to the document folder of the user 28->181 183 May check the online IP address of the machine 28->183 185 Creates HTML files with .exe extension (expired dropper behavior) 28->185 187 Disable Windows Defender real time protection (registry) 28->187 95 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 33->95 dropped 189 DLL reload attack detected 33->189 191 Detected unpacking (changes PE section rights) 33->191 193 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 33->193 199 4 other signatures 33->199 45 explorer.exe 33->45 injected 97 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 35->97 dropped 50 rundll32.exe 35->50         started        121 uyg5wye.2ihsfa.com 37->121 125 4 other IPs or domains 37->125 99 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 37->99 dropped 52 jfiag3g_gg.exe 37->52         started        54 jfiag3g_gg.exe 37->54         started        195 Performs DNS queries to domains with low reputation 39->195 197 Injects a PE file into a foreign processes 39->197 56 sotema_7.exe 39->56         started        127 2 other IPs or domains 41->127 129 2 other IPs or domains 43->129 58 WerFault.exe 43->58         started        file13 signatures14 process15 dnsIp16 131 kpotiques.com 45->131 133 twcamel.com 45->133 143 3 other IPs or domains 45->143 103 C:\Users\user\AppData\Roaming\eatfsbb, PE32 45->103 dropped 201 System process connects to network (likely due to code injection or exploit) 45->201 203 Benign windows process drops PE files 45->203 205 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->205 207 Writes to foreign memory regions 50->207 209 Allocates memory in foreign processes 50->209 211 Creates a thread in another existing process (thread injection) 50->211 60 svchost.exe 50->60 injected 63 svchost.exe 50->63 injected 65 svchost.exe 50->65 injected 67 3 other processes 50->67 213 Tries to harvest and steal browser information (history, passwords, etc) 52->213 135 uyg5wye.2ihsfa.com 56->135 137 flestriche.xyz 56->137 139 email.yg9.me 56->139 141 email.yg9.me 58->141 file17 215 Performs DNS queries to domains with low reputation 131->215 signatures18 process19 signatures20 173 System process connects to network (likely due to code injection or exploit) 60->173 175 Performs DNS queries to domains with low reputation 60->175 177 Sets debug register (to hijack the execution of another thread) 60->177 179 Modifies the context of a thread in another process (thread injection) 60->179 69 svchost.exe 60->69         started        process21 dnsIp22 111 email.yg9.me 69->111 113 uyg5wye.2ihsfa.com 69->113 115 3 other IPs or domains 69->115 165 Query firmware table information (likely to detect VMs) 69->165 signatures23 167 System process connects to network (likely due to code injection or exploit) 111->167 169 May check the online IP address of the machine 111->169 171 Performs DNS queries to domains with low reputation 113->171
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-07-01 22:40:29 UTC
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:vidar botnet:1028 botnet:30.09 botnet:6b473ae90575e46165b57807704d00b90b7f6fb2 botnet:706 botnet:937 botnet:domani2 aspackv2 backdoor discovery evasion infostealer spyware stealer themida trojan upx
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Raccoon
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
https://sergeevih43.tumblr.com/
flestriche.xyz:80
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
https://mas.to/@bardak1ho
195.133.18.5:45269
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
88d629dddea8dfdd05fc95df6127ea1f4dba39aaebda4c92b54d26e0524c8d06
MD5 hash:
a4c3b30c70ed966388d45e81f007c7da
SHA1 hash:
d42151845d43b672909dc7a6cedf9839985ccf5f
SH256 hash:
9eddae4a2b0c361821d4f86bb8454784122d2f6ee6b4ba96eb905e126a6c2d7e
MD5 hash:
13d62ac9eb1e7198c2e3e1067f354cac
SHA1 hash:
81b2778d7d8cdb2ec5c164b0586d0eda706f4786
SH256 hash:
f520c0170705c35ad918c3250c5e2de3466688b89f8fdc246afb74f7a80a3ffe
MD5 hash:
b4c282d194c1e12648651fe0cdc4db93
SHA1 hash:
7df8f10936e203f67e9d1652ed55691ddc38bba2
SH256 hash:
d2b98afa799a8da5a5b9593050721fb2a337f51ca06b04849c6e27dca4bd14a1
MD5 hash:
397b062ed648483b75bf1daec30dd171
SHA1 hash:
393136e0bcbbf1b645b4ea0e2be4ff23c94bee3e
SH256 hash:
af5c7f1997280c6947235bdc6503b735e169cd6814c47647d2c9e3b71a349458
MD5 hash:
e9b3a633eb50bf98dad73694a11abc14
SHA1 hash:
d11c409436c8edcfaaf7464b7257693caea4bf89
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
adb98685d3d6a8fa5e90b6fd9d458601d874718d5815f8aab66728ba9d067440
MD5 hash:
987d0f92ed9871031e0061e16e7bbac4
SHA1 hash:
b69f3badc82b6da0ff311f9dc509bac244464332
SH256 hash:
2b4a3c6d5d62270440c34e1ea75ba2878523eccc4ef85692c0e9497b6f1a8f43
MD5 hash:
5632c0cda7da1c5b57aeffeead5c40b7
SHA1 hash:
533805ba88fbd008457616ae2c3b585c952d3afe
SH256 hash:
d37e99805cee2a2a4d59542b88d1dfc23c7b166186666feef51f8751e940b174
MD5 hash:
7b61795697b50fb19d1f20bd8a234b67
SHA1 hash:
5134692d456da79579e9183c50db135485e95201
SH256 hash:
944da6db1405e6b0951293e7cdc49c0b52f5ff982e52f289ee41a510f70bc6b7
MD5 hash:
5681f185ffb071b3b2a4f3d0c4e461dd
SHA1 hash:
3bf6d38b125e9ff7775df59d75256b3281737942
SH256 hash:
36e8f71c59090ba0fa55df048f730f43d74857f3bca1427fedaa1e2c9dbbd757
MD5 hash:
41c00c478d5109de01b0c6068e3018be
SHA1 hash:
a9a5e66d20b7344327df8448ed7220a559d564df
SH256 hash:
63301a39b93b63acab80e0a05b909f733d792c7ae829a0a207d2fa2e1498158f
MD5 hash:
32df2eb9a83b1a97096aa403b6e5ce3f
SHA1 hash:
b427830c72004be17918c628918b8fc2ca2d43d1
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments