MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 67cd381d1702cb66cc450e13b1e8a27a3ff8c6713af8a925945b1cb449247578. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 3 YARA File information Comments

SHA256 hash: 67cd381d1702cb66cc450e13b1e8a27a3ff8c6713af8a925945b1cb449247578
SHA3-384 hash: c7791b1aa9bfaf20c325a8b47b7ae8fdb9a25b08fde18e3904202b6690e50cc13bf9e05b2c76ac34ff98266a027c4d26
SHA1 hash: e5784bbd7f392d26ee0f40c8b0c60563c0e81a44
MD5 hash: c5abebc7ba2b70520f66640385b53a75
humanhash: earth-beryllium-emma-april
File name:67CD381D1702CB66CC450E13B1E8A27A3FF8C6713AF8A.exe
Download: download sample
Signature RedLineStealer
File size:2'814'642 bytes
First seen:2022-03-31 06:46:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBNPkZVi7iKiF8cUvFyPO9L/J6CBtOhwnuCESL2Q/8GR0K+K0t0V9r0UEwJ84v9:xlri7ixZUvFyPxnw1L+K+K9oDCvLUBsT
TLSH T1F9D53351BED684FFC7161430A8843FB4B2FDC39C122459873B989B099F355D6843AABB
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
91.243.59.45:34762

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
213.227.155.102:443 https://threatfox.abuse.ch/ioc/228434/
91.243.59.45:34762 https://threatfox.abuse.ch/ioc/470799/
188.227.87.122:28204 https://threatfox.abuse.ch/ioc/470800/

Intelligence


File Origin
# of uploads :
1
# of downloads :
210
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Moving a file to the %temp% subdirectory
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
azorult barys overlay packed shell32.dll upatre
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PCHunter tool AveMaria DanaBot Nitol Red
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-07-15 18:44:42 UTC
File Type:
PE (Exe)
Extracted files:
250
AV detection:
30 of 42 (71.43%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
avemaria
Result
Malware family:
warzonerat
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar family:warzonerat botnet:933 botnet:@ywqmre botnet:boysac botnet:cana01 aspackv2 backdoor evasion infostealer rat stealer themida trojan upx
Behaviour
Checks SCSI registry key(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks BIOS information in registry
Checks computer location settings
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Vidar
WarzoneRat, AveMaria
Malware Config
C2 Extraction:
https://sslamlssa1.tumblr.com/
193.106.191.253:4752
185.215.113.66:26416
45.9.88.246:22191
176.111.174.254:56328
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
108.170.60.184:5200
Unpacked files
SH256 hash:
5a580d590efe50a4072580e030ff03a2bdc9cb5bb6424c8167e6cdc106662d80
MD5 hash:
9b8888a96bb81b13d824f42811dd73e4
SHA1 hash:
7a15193d26b0e2fb5f1894fee476aeb6987b2d5f
SH256 hash:
65e857b77577451c4894c0e9b8f3acc64906472b9bf980d76cb209b5b17a6e04
MD5 hash:
385b2e02d14579a16a0f73d48d266191
SHA1 hash:
248abbcee3367b48a98002560f521472b78d51e4
SH256 hash:
140687c607a8adee38572a2b5b5b12dcf4c5eecfa5d2428d34f09b627a71e6bd
MD5 hash:
0b1df2ab5308c2e8927f9adeac08c657
SHA1 hash:
10212be3c4b01016525039786e3f28909be1b96a
SH256 hash:
402654e6eef6841a5b9d79fffbebc2f7d5bbbd80c9988bc475a40e00c20be013
MD5 hash:
1131468f2de537877614e10ef8fd5208
SHA1 hash:
f4d81d4f86e26f7b7be1d414d9d75d4d6c3c87b9
SH256 hash:
55e9a570f195e846308180eaecae9a6155685f8fdfdc2fd06a04dd2d27a5b3cc
MD5 hash:
e7a51852abb1e460c985402a78cda9a4
SHA1 hash:
8d942e23a478f8618dfa512b27ec02b1f72639bf
SH256 hash:
ae33e6803ea079f2d5384e441a7970b3836088d0dff618c3dadca17f73727c87
MD5 hash:
539991cf3212a7886de777aa7363683e
SHA1 hash:
73ad1d82d636ecf58aee979ad78901e794a864b6
SH256 hash:
baec658d6aed06157f1d4421d80b8cb4619aabd1fd93d4d09d8cecd0338c25a4
MD5 hash:
6ffbe98820530ebfc6e5a52568d5484c
SHA1 hash:
5ae18a100278a3a157f4c27df0ac2989547ee7d6
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
6f224c710a5362f9f7a83c9f4e2333019ebc807927fbd50efbc4407c0e820540
MD5 hash:
3f3b3883dcbde2d0cf4d5a7ac731627f
SHA1 hash:
c362de5f7def6ec5987ee4f9c089f00a3792a5c0
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
a0a30765d8de60813e2afee8d8045c6ef32ebdd81edd20e9b4d16cd7e470d24f
MD5 hash:
1c6c5449a374e1d3acecbf374dfcbb03
SHA1 hash:
3af9b2a06e52c6eaa666b3b28df942097f16b078
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
9717f526bf9c56a5d06ccd0fb71eef0579d26b7100d01665b76d8fdd211b48bd
MD5 hash:
dbc3e1e93fe6f9e1806448cd19e703f7
SHA1 hash:
061119a118197ca93f69045abd657aa3627fc2c5
SH256 hash:
d09bd223812da206f85fdd3e8ff586d1859a030bf882a754be36ac587e5fd0cc
MD5 hash:
e2ce756404cd006282dd56f37c7617f0
SHA1 hash:
690962ff3e05bccf3e41dde70faa76395c0edaad
SH256 hash:
67cd381d1702cb66cc450e13b1e8a27a3ff8c6713af8a925945b1cb449247578
MD5 hash:
c5abebc7ba2b70520f66640385b53a75
SHA1 hash:
e5784bbd7f392d26ee0f40c8b0c60563c0e81a44
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments