MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6c7c4ceefd791447749b3acc9e3b96c111baa79d1b7f4ebef000cf8180e1a980. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments 1

SHA256 hash: 6c7c4ceefd791447749b3acc9e3b96c111baa79d1b7f4ebef000cf8180e1a980
SHA3-384 hash: 0cdbe4f48c36721d577ac31b82ae1e2378e3f29a26a9a26a6790f1001b87e36b05b0b38f407d12a8e4aaee3668827214
SHA1 hash: 5fe8b2f6aedd2205ee91423ea455881e039bc87a
MD5 hash: af78143db21cfeb719975f8fd7291c19
humanhash: ink-venus-angel-winner
File name:af78143db21cfeb719975f8fd7291c19
Download: download sample
Signature RedLineStealer
File size:276'992 bytes
First seen:2021-09-30 22:20:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7fd6de8b7ac14820eae90d7350ac48ac (5 x RaccoonStealer, 4 x RedLineStealer, 3 x Tofsee)
ssdeep 3072:Ny1lAwGRWIRtca6RGt2G5nJpaZkIae2HkL66qhBBQW4bvPQiaDhxxMKetkkrsC96:Nyk98ajt1JqJL6fXOOhxxdeTr/ekI
Threatray 4'796 similar samples on MalwareBazaar
TLSH T12E44AE293682CFF2D67102F1AB46C7E0452EBD6C4D56764F3B98331E7E3D3919A22242
File icon (PE):PE icon
dhash icon 4839b234e8c38890 (121 x RaccoonStealer, 54 x RedLineStealer, 51 x ArkeiStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
af78143db21cfeb719975f8fd7291c19
Verdict:
Suspicious activity
Analysis date:
2021-09-30 22:23:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Tofsee
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect the country of the analysis system (by using the IP)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 494776 Sample: iRCn0A58qT Startdate: 01/10/2021 Architecture: WINDOWS Score: 100 92 vpn.elementhosts.com 2->92 94 teletop.top 2->94 96 5 other IPs or domains 2->96 116 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->116 118 Multi AV Scanner detection for domain / URL 2->118 120 Antivirus detection for URL or domain 2->120 122 19 other signatures 2->122 11 iRCn0A58qT.exe 2->11         started        14 dpwqvbow.exe 2->14         started        16 irgghfa 2->16         started        18 10 other processes 2->18 signatures3 process4 dnsIp5 164 Detected unpacking (changes PE section rights) 11->164 166 Contains functionality to inject code into remote processes 11->166 168 Injects a PE file into a foreign processes 11->168 21 iRCn0A58qT.exe 11->21         started        170 Detected unpacking (overwrites its own PE header) 14->170 172 Writes to foreign memory regions 14->172 174 Allocates memory in foreign processes 14->174 24 svchost.exe 14->24         started        27 irgghfa 16->27         started        98 api.wipmania.com 127.0.0.1 unknown unknown 18->98 176 Changes security center settings (notifications, updates, antivirus, firewall) 18->176 signatures6 process7 dnsIp8 154 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 21->154 156 Maps a DLL or memory area into another process 21->156 158 Checks if the current machine is a virtual machine (disk enumeration) 21->158 160 Creates a thread in another existing process (thread injection) 21->160 29 explorer.exe 13 21->29 injected 102 microsoft-com.mail.protection.outlook.com 40.93.207.1, 25, 49806 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 24->102 104 defeatwax.ru 193.56.146.188, 443, 49811, 49870 LVLT-10753US unknown 24->104 106 192.168.2.1 unknown unknown 24->106 162 System process connects to network (likely due to code injection or exploit) 24->162 signatures9 process10 dnsIp11 110 193.56.146.41, 49781, 9080 LVLT-10753US unknown 29->110 112 216.128.137.31, 80 AS-CHOOPAUS United States 29->112 114 3 other IPs or domains 29->114 84 C:\Users\user\AppData\Roaming\irgghfa, PE32 29->84 dropped 86 C:\Users\user\AppData\Local\Temp\AF75.exe, PE32 29->86 dropped 88 C:\Users\user\AppData\Local\Temp\A2C2.exe, PE32 29->88 dropped 90 4 other malicious files 29->90 dropped 178 System process connects to network (likely due to code injection or exploit) 29->178 180 Benign windows process drops PE files 29->180 182 Deletes itself after installation 29->182 184 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->184 34 3D53.exe 2 29->34         started        38 A2C2.exe 29->38         started        40 71A5.exe 29->40         started        42 3 other processes 29->42 file12 signatures13 process14 dnsIp15 78 C:\Users\user\AppData\Local\...\dpwqvbow.exe, PE32 34->78 dropped 124 Detected unpacking (changes PE section rights) 34->124 126 Detected unpacking (overwrites its own PE header) 34->126 128 Machine Learning detection for dropped file 34->128 144 2 other signatures 34->144 45 cmd.exe 34->45         started        48 cmd.exe 34->48         started        50 sc.exe 34->50         started        64 3 other processes 34->64 130 Injects a PE file into a foreign processes 38->130 52 A2C2.exe 38->52         started        132 Query firmware table information (likely to detect VMs) 40->132 134 Tries to detect sandboxes and other dynamic analysis tools (window names) 40->134 136 Hides threads from debuggers 40->136 138 Tries to detect sandboxes / dynamic malware analysis system (registry check) 40->138 108 cdn.discordapp.com 162.159.134.233, 443, 49787 CLOUDFLARENETUS United States 42->108 80 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 42->80 dropped 140 Antivirus detection for dropped file 42->140 142 Multi AV Scanner detection for dropped file 42->142 55 AF75.exe 2 42->55         started        58 conhost.exe 42->58         started        60 conhost.exe 42->60         started        62 AdvancedRun.exe 42->62         started        file16 signatures17 process18 dnsIp19 82 C:\Windows\SysWOW64\...\dpwqvbow.exe (copy), PE32 45->82 dropped 66 conhost.exe 45->66         started        68 conhost.exe 48->68         started        70 conhost.exe 50->70         started        146 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 52->146 148 Maps a DLL or memory area into another process 52->148 150 Checks if the current machine is a virtual machine (disk enumeration) 52->150 152 Creates a thread in another existing process (thread injection) 52->152 100 188.72.208.174, 38430, 49826 WEBZILLANL Netherlands 55->100 72 conhost.exe 64->72         started        74 conhost.exe 64->74         started        76 conhost.exe 64->76         started        file20 signatures21 process22
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-09-30 22:21:11 UTC
AV detection:
17 of 45 (37.78%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:tofsee family:xmrig botnet:114кk botnet:1bed76c07351ef1ae6636c5ca88067d28ce78ad4 botnet:2k star botnet:5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4 botnet:aura botnet:r backdoor discovery evasion infostealer miner persistence spyware stealer suricata themida trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
Windows security modification
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Nirsoft
XMRig Miner Payload
Modifies Windows Defender Real-time Protection settings
Raccoon
RedLine
RedLine Payload
SmokeLoader
Tofsee
Turns off Windows Defender SpyNet reporting
Windows security bypass
suricata: ET MALWARE DNS Query Sinkhole Domain Various Families (Possible Infected Host)
suricata: ET MALWARE Likely Bot Nick in IRC (Country Code ISO 3166-1 alpha-2
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Win32.Raccoon Stealer CnC Activity (dependency download)
suricata: ET MALWARE Win32.Raccoon Stealer Data Exfil Attempt
xmrig
Malware Config
C2 Extraction:
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
narlelalik.xyz:12509
193.56.146.60:18243
185.132.134.148:55353
188.72.208.174:38430
Unpacked files
SH256 hash:
592b089027938156e18387e4402b965a5f1ffc25e96d7efc3aa9331254587bdd
MD5 hash:
2dbb1eb8c40c88994738a736ad55c79b
SHA1 hash:
88e2fc9242606c7dfcd68d5da8c6d457837157a3
SH256 hash:
6c7c4ceefd791447749b3acc9e3b96c111baa79d1b7f4ebef000cf8180e1a980
MD5 hash:
af78143db21cfeb719975f8fd7291c19
SHA1 hash:
5fe8b2f6aedd2205ee91423ea455881e039bc87a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 6c7c4ceefd791447749b3acc9e3b96c111baa79d1b7f4ebef000cf8180e1a980

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-30 22:20:38 UTC

url : hxxp://privacy-toolz-for-you-503.top/downloads/toolspab2.exe