MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6c4aaf39142db9f2d3adc6f3a90d986a55fd54273be564d61a4cc229e55131af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 6c4aaf39142db9f2d3adc6f3a90d986a55fd54273be564d61a4cc229e55131af
SHA3-384 hash: 7edfb4f23e72bb45f962264eae5fefcbcea0315ca11fd25befb9cccb0e951ae6c6d30ce0150c3557b65d0a21d73187cb
SHA1 hash: 6db9c713d70d8f3715db9ef4139669d8d110c4e9
MD5 hash: 3d75e7230bf434ceff8710174ee115b8
humanhash: seven-butter-quiet-nebraska
File name:3d75e7230bf434ceff8710174ee115b8.exe
Download: download sample
Signature RedLineStealer
File size:292'128 bytes
First seen:2023-11-29 13:55:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 87d552636d31eb7a2797c4a63e862d4a (4 x RedLineStealer)
ssdeep 6144:vyU1zKCKVDp3Cbitu7gJzmgkYUDBg8ZHAO0Jb8CuZoHI66G:vyU1K9pv6RZH2nuZn66G
Threatray 4'309 similar samples on MalwareBazaar
TLSH T149548E0676D2C4B3D523123209E8D7B95A3EF9110B5189EFA7A84F7E8FB13C09D31969
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
194.49.94.80:29960

Intelligence


File Origin
# of uploads :
1
# of downloads :
312
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
d01a6a68dc8f110c7372e8e8556830ee.exe
Verdict:
Malicious activity
Analysis date:
2023-11-26 19:00:31 UTC
Tags:
risepro stealer evasion redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending a custom TCP request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Connecting to a non-recommended domain
Sending an HTTP POST request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Creating a file
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, RedLine, Smoke
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1349893 Sample: UX5jziFo4b.exe Startdate: 29/11/2023 Architecture: WINDOWS Score: 100 159 Found malware configuration 2->159 161 Malicious sample detected (through community Yara rule) 2->161 163 Antivirus detection for URL or domain 2->163 165 17 other signatures 2->165 13 UX5jziFo4b.exe 1 2->13         started        16 XsdType.exe 2->16         started        18 svchost.exe 2->18         started        21 gcfhghj 2->21         started        process3 dnsIp4 207 Contains functionality to inject code into remote processes 13->207 209 Writes to foreign memory regions 13->209 211 Allocates memory in foreign processes 13->211 213 Injects a PE file into a foreign processes 13->213 23 AppLaunch.exe 13->23         started        26 conhost.exe 13->26         started        215 Multi AV Scanner detection for dropped file 16->215 217 Modifies the context of a thread in another process (thread injection) 16->217 219 Sample uses process hollowing technique 16->219 143 23.221.242.90 TISCALI-IT United States 18->143 145 127.0.0.1 unknown unknown 18->145 signatures5 process6 signatures7 195 Found evasive API chain (may stop execution after checking system information) 23->195 197 Found API chain indicative of debugger detection 23->197 199 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->199 205 4 other signatures 23->205 28 explorer.exe 41 36 23->28 injected 201 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 26->201 203 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 26->203 process8 dnsIp9 153 109.107.182.45 TELEPORT-TV-ASRU Russian Federation 28->153 155 185.196.8.238 SIMPLECARRER2IT Switzerland 28->155 157 6 other IPs or domains 28->157 135 C:\Users\user\AppData\Roaming\jrfhghj, PE32 28->135 dropped 137 C:\Users\user\AppData\Local\Temp\FB98.exe, PE32 28->137 dropped 139 C:\Users\user\AppData\Local\TempDD0.exe, PE32 28->139 dropped 141 12 other files (11 malicious) 28->141 dropped 243 System process connects to network (likely due to code injection or exploit) 28->243 245 Benign windows process drops PE files 28->245 247 Adds a directory exclusion to Windows Defender 28->247 249 Hides that the sample has been downloaded from the Internet (zone.identifier) 28->249 33 2C5F.exe 28->33         started        37 3D09.exe 28->37         started        39 751.exe 3 28->39         started        41 6 other processes 28->41 file10 signatures11 process12 dnsIp13 101 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 33->101 dropped 103 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 33->103 dropped 105 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 33->105 dropped 111 2 other malicious files 33->111 dropped 167 Multi AV Scanner detection for dropped file 33->167 44 tuc3.exe 33->44         started        48 toolspub2.exe 33->48         started        50 31839b57a4f11171d6abc8bbc4451ee4.exe 33->50         started        60 4 other processes 33->60 107 C:\Users\user\AppData\Local\Temp\...\3D09.tmp, PE32 37->107 dropped 52 3D09.tmp 37->52         started        169 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 39->169 171 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 39->171 173 Modifies the context of a thread in another process (thread injection) 39->173 175 Injects a PE file into a foreign processes 39->175 54 751.exe 5 39->54         started        147 194.169.175.235 CLOUDCOMPUTINGDE Germany 41->147 149 195.10.205.16 TSSCOM-ASRU Russian Federation 41->149 151 6 other IPs or domains 41->151 109 C:\Users\user\AppData\Roaming\wabzaZXb.exe, PE32 41->109 dropped 177 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 41->177 179 Found many strings related to Crypto-Wallets (likely being stolen) 41->179 181 Tries to harvest and steal browser information (history, passwords, etc) 41->181 183 Tries to steal Crypto Currency Wallets 41->183 56 conhost.exe 41->56         started        58 conhost.exe 41->58         started        62 2 other processes 41->62 file14 signatures15 process16 file17 125 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 44->125 dropped 221 Multi AV Scanner detection for dropped file 44->221 64 tuc3.tmp 44->64         started        223 Detected unpacking (changes PE section rights) 48->223 225 Injects a PE file into a foreign processes 48->225 66 toolspub2.exe 48->66         started        227 Detected unpacking (overwrites its own PE header) 50->227 229 UAC bypass detected (Fodhelper) 50->229 231 Found Tor onion address 50->231 233 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 50->233 69 3D09.exe 52->69         started        127 C:\Users\user\AppData\Local\...\XsdType.exe, PE32+ 54->127 dropped 235 Found many strings related to Crypto-Wallets (likely being stolen) 54->235 129 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 60->129 dropped 131 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 60->131 dropped 133 C:\Windows\System32\drivers\etc\hosts, ASCII 60->133 dropped 237 Modifies the hosts file 60->237 239 Adds a directory exclusion to Windows Defender 60->239 72 Broom.exe 60->72         started        signatures18 process19 file20 74 tuc3.exe 64->74         started        185 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 66->185 187 Maps a DLL or memory area into another process 66->187 189 Checks if the current machine is a virtual machine (disk enumeration) 66->189 191 Creates a thread in another existing process (thread injection) 66->191 113 C:\Users\user\AppData\Local\Temp\...\3D09.tmp, PE32 69->113 dropped 77 3D09.tmp 69->77         started        193 Multi AV Scanner detection for dropped file 72->193 signatures21 process22 file23 115 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 74->115 dropped 80 tuc3.tmp 74->80         started        117 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 77->117 dropped 119 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 77->119 dropped 121 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 77->121 dropped 123 13 other files (12 malicious) 77->123 dropped 241 Uses schtasks.exe or at.exe to add and modify task schedules 77->241 83 VolumeUTIL.exe 77->83         started        85 schtasks.exe 77->85         started        signatures24 process25 file26 91 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 80->91 dropped 93 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 80->93 dropped 95 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 80->95 dropped 99 12 other files (11 malicious) 80->99 dropped 87 schtasks.exe 80->87         started        97 C:\ProgramData\SVGARateEX\SVGARateEX.exe, PE32 83->97 dropped 89 conhost.exe 85->89         started        process27
Threat name:
Win32.Spyware.TrickBot
Status:
Malicious
First seen:
2023-11-26 18:51:05 UTC
File Type:
PE (Exe)
AV detection:
24 of 37 (64.86%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:zgrat botnet:@ytlogsbot botnet:livetraffic backdoor discovery evasion infostealer rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Stops running service(s)
Detect ZGRat V1
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
ZGRat
Malware Config
C2 Extraction:
http://194.49.94.210/fks/index.php
194.169.175.235:42691
195.10.205.16:2245
Unpacked files
SH256 hash:
6c4aaf39142db9f2d3adc6f3a90d986a55fd54273be564d61a4cc229e55131af
MD5 hash:
3d75e7230bf434ceff8710174ee115b8
SHA1 hash:
6db9c713d70d8f3715db9ef4139669d8d110c4e9
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments