MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6e662c3d403396c5bfec2b051dd49b39662c3ff80f39c16ece3ebc2e1c469208. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA File information Comments

SHA256 hash: 6e662c3d403396c5bfec2b051dd49b39662c3ff80f39c16ece3ebc2e1c469208
SHA3-384 hash: 01bf551db518d1f594a6867b77a5bcca28699ca7028d9bbf8edb92f49a15ed11e68edcddd7a2233ddc7ae4c664a88c33
SHA1 hash: a3c39a3bdc1b17796de57a5e9fbb04ebbc532644
MD5 hash: b48c4ccd785b4915891f9986ec3d69c6
humanhash: echo-black-berlin-ohio
File name:b48c4ccd785b4915891f9986ec3d69c6.exe
Download: download sample
Signature RedLineStealer
File size:7'296'014 bytes
First seen:2021-12-27 07:10:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:Jo9P1x0s9TfkOA9b66oWpaJBvTXN1k/7I:JoFz0qT8D9bSfvTdO/U
Threatray 532 similar samples on MalwareBazaar
TLSH T1C07633A5F4B9D1BFFA1486F044C887BB1190D3DE62CCF215937C6E89CA6598D81C2AF4
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
81.176.229.76:31970

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
81.176.229.76:31970 https://threatfox.abuse.ch/ioc/287793/

Intelligence


File Origin
# of uploads :
1
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b48c4ccd785b4915891f9986ec3d69c6.exe
Verdict:
No threats detected
Analysis date:
2021-12-27 11:57:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
chrome overlay packed socelars
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 545514 Sample: 8TDgYQyI5F.exe Startdate: 27/12/2021 Architecture: WINDOWS Score: 100 78 20.189.173.21 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->78 80 116.202.14.219 HETZNER-ASDE Germany 2->80 82 4 other IPs or domains 2->82 102 Multi AV Scanner detection for domain / URL 2->102 104 Antivirus detection for URL or domain 2->104 106 Antivirus detection for dropped file 2->106 108 18 other signatures 2->108 10 8TDgYQyI5F.exe 10 2->10         started        signatures3 process4 file5 46 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->46 dropped 13 setup_installer.exe 24 10->13         started        process6 file7 48 C:\Users\user\AppData\...\setup_install.exe, PE32 13->48 dropped 50 C:\Users\user\...\Fri00dfa1fd2c1b9.exe, PE32 13->50 dropped 52 C:\Users\user\...\Fri00a1ea73f577d492.exe, PE32 13->52 dropped 54 18 other files (8 malicious) 13->54 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 74 104.21.37.14 CLOUDFLARENETUS United States 16->74 76 127.0.0.1 unknown unknown 16->76 98 Adds a directory exclusion to Windows Defender 16->98 100 Disables Windows Defender (via service or powershell) 16->100 20 cmd.exe 16->20         started        22 cmd.exe 1 16->22         started        24 cmd.exe 1 16->24         started        26 12 other processes 16->26 signatures10 process11 signatures12 29 Fri00dfa1fd2c1b9.exe 20->29         started        34 Fri00a01549fe8.exe 22->34         started        36 Fri005d287271822336.exe 14 7 24->36         started        110 Adds a directory exclusion to Windows Defender 26->110 112 Disables Windows Defender (via service or powershell) 26->112 38 Fri000d574c421.exe 26->38         started        40 Fri006dd6f669ab4feab.exe 26->40         started        42 Fri006880b491181ed.exe 26->42         started        44 5 other processes 26->44 process13 dnsIp14 84 185.215.113.208 WHOLESALECONNECTIONSNL Portugal 29->84 86 103.155.92.143 TWIDC-AS-APTWIDCLimitedHK unknown 29->86 94 14 other IPs or domains 29->94 56 C:\Users\...\jAD3Nu9nGeXdeahy75UBwYsv.exe, PE32 29->56 dropped 58 C:\Users\...\KUpIg28oyj09AGOTeotrCZFZ.exe, PE32+ 29->58 dropped 60 C:\Users\user\AppData\...\toolspab2[1].exe, PE32 29->60 dropped 70 38 other files (11 malicious) 29->70 dropped 114 Creates HTML files with .exe extension (expired dropper behavior) 29->114 116 Tries to harvest and steal browser information (history, passwords, etc) 29->116 118 Disable Windows Defender real time protection (registry) 29->118 120 Machine Learning detection for dropped file 34->120 122 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 34->122 124 Checks if the current machine is a virtual machine (disk enumeration) 34->124 88 104.21.34.205 CLOUDFLARENETUS United States 36->88 62 7847d512-f282-4dc8-a577-28e6176c3698.exe, PE32 36->62 dropped 64 18595bb1-4c25-4174-a696-fe3b4b66139f.exe, PE32 36->64 dropped 72 2 other files (1 malicious) 36->72 dropped 66 C:\Users\user\AppData\...\Fri000d574c421.tmp, PE32 38->66 dropped 126 Obfuscated command line found 38->126 90 208.95.112.1 TUT-ASUS United States 44->90 92 148.251.234.83 HETZNER-ASDE Germany 44->92 96 4 other IPs or domains 44->96 68 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 44->68 dropped file15 signatures16
Threat name:
Win32.Hacktool.NirSoftPT
Status:
Malicious
First seen:
2021-12-25 12:52:22 UTC
File Type:
PE (Exe)
Extracted files:
395
AV detection:
33 of 43 (76.74%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:915 botnet:userv1 aspackv2 backdoor discovery evasion infostealer persistence spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
159.69.246.184:13127
Unpacked files
SH256 hash:
12f682423118581850910cddfb42e2ebb2851e4ec5c346c041f71a1dda51c057
MD5 hash:
029e5130789f584309502d7e23d6b3ec
SHA1 hash:
93f64300d51f9dbd6119c6aa4fdebecb44372758
SH256 hash:
f94a49f7e9098caec29318488c6ee905bcfb2a5bf6e987305e03576b0da5c595
MD5 hash:
294856fef3e5664d6c4ab77bbdd1f4d2
SHA1 hash:
255d454b5dd344ea29e92e0f0f0ba6908790a6a8
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
e5652b5152dcbebf7b937cc011d066bdf36dea66fe8e24de7fa3dcc72ab1e9ca
MD5 hash:
7e4290c2f5b38bc8cf9482b88af9d3e3
SHA1 hash:
4b9bd173e7a7480b2faf3ee3e026319fa3f76850
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
69aa2a37019e65b1e916c3df734323b5392b1756323732665b867b818e783607
MD5 hash:
04ae278e4ed573dbf11dd808c46eb678
SHA1 hash:
d0c26684ea0ce15f982137ef4362dd9ec72e08b1
SH256 hash:
6ef893d37e04aa5bc891046d370859992d7601b67bf01fe3d5d3fb37cca578cd
MD5 hash:
10c1ea3e40764a413e8aa123df4267c1
SHA1 hash:
c31ce2d8953b47e7c5324d629d8e19b85a6a8dbb
SH256 hash:
dc36d3631189432fc1c1c52b84bca9a0755a5d6592669ef4a335f270d612832e
MD5 hash:
ea87eaa2e1949635de70792d17c4d40d
SHA1 hash:
c07342b31d48539720e6b53427cab544ea8e0da3
SH256 hash:
3c56025e4b133f4ed93144779638033d3e53272ff85e1f86a34497f9d83361b0
MD5 hash:
33f16f90796926ff4cfa3632a02c812c
SHA1 hash:
b72bbc9261b43bba488bba240bc7ce70b3038a04
SH256 hash:
dd328ae57b903b29f89081931360809025ff3716616e696d934b8bf2356d6cd7
MD5 hash:
b2ad843762942d21ba99e4cc7f61698c
SHA1 hash:
b5f70503f8151fdf59daf96bf54869dea79ebd70
SH256 hash:
12bee30a12d8d3741392001a46c63208d00b6d4f4b305f8c500d92a69b6b85fc
MD5 hash:
a0df958d82e7ea7d08e8526c30f18a3d
SHA1 hash:
a74ede615b7d99edbd2cdf4010ecfe69e861f361
SH256 hash:
948d9bbe69d9fc953fd23f8872b19a0e215c01a0a6904a7134ccc6f27aab108c
MD5 hash:
64faba357a90e5120b5c6db09c985b78
SHA1 hash:
90bc4436333c9210eeceb1699f5bb8558287aea8
SH256 hash:
4603e6055ead4e529700b788a05c9952ebf55f4abb0c844048f98608edd52e54
MD5 hash:
8e220746af8e40518b7f9900a683bc13
SHA1 hash:
458cb7a692877e695896118fcff8ac5940ff5fb8
SH256 hash:
63553b7227dcfdba45ce54d4216eb61aac3e6708dc472081cb79a4b5750a8d44
MD5 hash:
c28a84fee4397a147f92cdad3004a495
SHA1 hash:
396c9ff21dd606676f319e707d6e32b20fe62ce9
SH256 hash:
22b43eae10a9b3ea08e385073c1c069b892e2c68e4f032e648232df9dde40d83
MD5 hash:
9e37ca7756aa7215281a2f165294266a
SHA1 hash:
2c18f5e41d3b3f62cea6e661abbefbeeb8fcaed8
SH256 hash:
7ef8dfac91d19b5af509de02bc4823e2af44197968c27add5f38e9ccf7f01a3b
MD5 hash:
7bfbec9fe1f1ebf57bf7821827f15aef
SHA1 hash:
157488d971754c631d13f82b4776be2c76a29742
SH256 hash:
f45daafd61371b1f080a92eea8e9c8bfc9b710f22c82d5a06a1b1bf271c646ad
MD5 hash:
7e32ef0bd7899fa465bb0bc866b21560
SHA1 hash:
115d09eeaff6bae686263d57b6069dd41f63c80c
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
6c3405731591e3f3d881bb5b1feee6d44d5415615381502b73842c6d89759046
MD5 hash:
09e9e16ca45b517a187cb5a3df0ffbac
SHA1 hash:
18d813e85218961f58e01d40079b08df712a952b
SH256 hash:
cf147e315859726e0e04ac19ac0c05e8d4e85091c5c5c68c2b172bc35454a304
MD5 hash:
a872f0387bb6fb2712b3446b56e9f5cd
SHA1 hash:
fe165bd11d50a81a2a8ac8cb2b82ea21cb4e5409
SH256 hash:
011f0a0d91130dc1821098858981fecec54dcbd31bcb686067da3ace75bb4b6b
MD5 hash:
c302ca810c9f8c9043fb67b1b4f171c5
SHA1 hash:
2f79bc5d912823c704461c632e5aea65c0e6a462
SH256 hash:
f0f1461a6cdd359a05b639e389ead89e06b1ee002eda59402a846a8c38f03415
MD5 hash:
2ab681acac889956a8808112a21b7bee
SHA1 hash:
e839291f9f122428c21378735652e0f38c6e41a8
SH256 hash:
82d6e1dc47481bc6bf1aebdaab51027248aa904d6a2a5bbcd78b68c0f5706bd6
MD5 hash:
102d069abcda999a0e0a927a185bb2e9
SHA1 hash:
2218f57f3e098d0c4b491078f85da7524ae84b91
SH256 hash:
d4b095d2abd3a5ae59a656012f08c35a92a4244f8f1aa95d0ac74cc8d5f094ad
MD5 hash:
6a214b0ef5486b1c811ff2c4fbf84c65
SHA1 hash:
a739097512e99dfeaf64bb94675f93283c905e43
SH256 hash:
6e662c3d403396c5bfec2b051dd49b39662c3ff80f39c16ece3ebc2e1c469208
MD5 hash:
b48c4ccd785b4915891f9986ec3d69c6
SHA1 hash:
a3c39a3bdc1b17796de57a5e9fbb04ebbc532644
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments