MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7227c5067dc82a381a3c7485a21c64b702f7e987a46d1349f95e269399e862eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 2 YARA 5 File information Comments

SHA256 hash: 7227c5067dc82a381a3c7485a21c64b702f7e987a46d1349f95e269399e862eb
SHA3-384 hash: deacc0f215c02ff5af09c3b55606718c99ba6082bcc51df6ae196a3c0cb1fcc947699f125911a71aa926094091405090
SHA1 hash: c0780ed446880bde3570bb4627c29d2c38286b92
MD5 hash: 6d9b2f0e4a7c5a70ed72203c642ea152
humanhash: delaware-robert-arizona-vegan
File name:7227C5067DC82A381A3C7485A21C64B702F7E987A46D1.exe
Download: download sample
Signature RedLineStealer
File size:3'458'114 bytes
First seen:2021-12-26 19:45:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xTCvLUBsgdyz+D8GKGu8q6ZO1/CWNP34LBM8qfIQzo:xoLUCgdyzU8GKGuoZYC7qfTzo
TLSH T139F533103BF99DF6D897A070EB489BB6E0B9C39D0B3148CB7368D52C1B3E5965137928
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
37.9.13.195:23036

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
37.9.13.195:23036 https://threatfox.abuse.ch/ioc/287771/
185.215.113.85:13374 https://threatfox.abuse.ch/ioc/287794/

Intelligence


File Origin
# of uploads :
1
# of downloads :
323
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7227C5067DC82A381A3C7485A21C64B702F7E987A46D1.exe
Verdict:
No threats detected
Analysis date:
2021-12-26 19:48:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
DNS request
Creating a file
Query of malicious DNS domain
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
arkeistealer barys overlay packed smokeloader upatre
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 545456 Sample: 7227C5067DC82A381A3C7485A21... Startdate: 26/12/2021 Architecture: WINDOWS Score: 100 58 thegymmum.com 2->58 60 s.lletlee.com 2->60 62 5 other IPs or domains 2->62 76 Multi AV Scanner detection for domain / URL 2->76 78 Found malware configuration 2->78 80 Antivirus detection for URL or domain 2->80 82 10 other signatures 2->82 11 7227C5067DC82A381A3C7485A21C64B702F7E987A46D1.exe 15 2->11         started        14 wcfbwcf 2->14         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\setup_install.exe, PE32 11->50 dropped 52 C:\Users\user\AppData\Local\...\libcurl.dll, PE32 11->52 dropped 54 C:\Users\user\...\Tue06f7ded99fc03.exe, PE32 11->54 dropped 56 10 other files (6 malicious) 11->56 dropped 17 setup_install.exe 1 11->17         started        98 Antivirus detection for dropped file 14->98 100 Detected unpacking (changes PE section rights) 14->100 102 Machine Learning detection for dropped file 14->102 104 4 other signatures 14->104 signatures6 process7 signatures8 74 Adds a directory exclusion to Windows Defender 17->74 20 cmd.exe 1 17->20         started        22 cmd.exe 1 17->22         started        24 cmd.exe 1 17->24         started        26 3 other processes 17->26 process9 signatures10 29 Tue069ba7c60d6634eed.exe 20->29         started        32 Tue06f7ded99fc03.exe 2 22->32         started        34 Tue06bd96f98bdce60f7.exe 6 24->34         started        88 Adds a directory exclusion to Windows Defender 26->88 37 powershell.exe 25 26->37         started        process11 dnsIp12 90 Antivirus detection for dropped file 29->90 92 Multi AV Scanner detection for dropped file 29->92 94 Detected unpacking (changes PE section rights) 29->94 96 5 other signatures 29->96 39 explorer.exe 1 29->39 injected 43 Tue06f7ded99fc03.exe 1 32->43         started        64 s.lletlee.com 34->64 66 live.goatgame.live 34->66 68 2 other IPs or domains 34->68 signatures13 process14 dnsIp15 48 C:\Users\user\AppData\Roaming\wcfbwcf, PE32 39->48 dropped 84 Benign windows process drops PE files 39->84 86 Hides that the sample has been downloaded from the Internet (zone.identifier) 39->86 70 s.lletlee.com 43->70 72 live.goatgame.live 43->72 46 conhost.exe 43->46         started        file16 signatures17 process18
Threat name:
Win32.Downloader.Upatre
Status:
Malicious
First seen:
2021-08-24 07:38:25 UTC
File Type:
PE (Exe)
Extracted files:
272
AV detection:
23 of 28 (82.14%)
Threat level:
  3/5
Verdict:
malicious
Label(s):
agenttesla ryuk
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:vidar botnet:706 botnet:937 botnet:ruzki aspackv2 backdoor evasion infostealer spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M5
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin
suricata: ET MALWARE Win32/Unk.HRESQ! MultiDownloader Checkin M2
Malware Config
C2 Extraction:
https://eduarroma.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
http://melchen-testet.at/upload/
http://zjymf.com/upload/
http://pbxbmu70275.cn/upload/
http://mnenenravitsya.ru/upload/
http://pitersprav.ru/upload/
185.215.113.29:34865
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
Unpacked files
SH256 hash:
feacf0ca0c6af0eba09c8e235527d1eb0979005051ef68abba1a38f7815c0f84
MD5 hash:
806c20eb3d12ef4ed586250503b66948
SHA1 hash:
92d0c7844988c60a21b8bbbeb55aa350a3499254
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
Detections:
win_vidar_auto
SH256 hash:
a62e66255f1d647de0fb7fb0f06a2d6abed2af113658be7fe19784834c0a3236
MD5 hash:
b3da7b927138d84f8bbf8d0da66a0cdb
SHA1 hash:
efb2c0bbbd47f4265c50946577976fedb92a3164
SH256 hash:
bdd9bd0cd6ef4ff8fe3eb342a26b2807368168981ad7575bda97095f1daf92ce
MD5 hash:
cd735fe854e7d8ed00490e7ca2c90698
SHA1 hash:
9ef46b0895cab1cc4de70ee7e58d90c7ced4c232
SH256 hash:
710c8df4e791a0f4ac8a7351c0c718a6ddb685a3d57abfd2c064c398617bb9b1
MD5 hash:
4ffcfe89a6f218943793ff6ea9bb5e79
SHA1 hash:
8ff66c6fe276857ba0ce6f533d383813e5ce6943
SH256 hash:
3c8516f040182e870447422a008e3033a91876e6d201b23d63b3990935b10e81
MD5 hash:
b89ba18fdf8610d1cc05fceed9147a5e
SHA1 hash:
738179699d6eb1b9c919ad1a6dffe4c21a739cb0
SH256 hash:
a0be77086e2d92e925e98ea667b00d1b3d6589ed465fd6bafdf296c6313105b1
MD5 hash:
5ec77d474b6e6604f939dc5d3a7d5c94
SHA1 hash:
35b4a32067e6609357e8d7401e710c7dab1f7aec
SH256 hash:
eea08721bb7e2a4e06cad305652601d19fc67da2579c1dd7154c49dfab0f65c7
MD5 hash:
416d9da6fe4dc05f204c08f779276c9f
SHA1 hash:
329d20c123088cb5ca446989de7e765c8d3f45e9
SH256 hash:
d164e2030a45d405eee30cbc340e330cf6c8020f782119af638431afdd784723
MD5 hash:
2736ecacc819c7e7e07568a8b7b4acf4
SHA1 hash:
f7defbf16187316626a36889a00cd9b76f214ea2
SH256 hash:
741150344a8457007061e1d202fa240821d289cdb1396eb9352b477b948b9fbe
MD5 hash:
187be2fe4da528c1ed3711050a592a11
SHA1 hash:
2156e30859c6b0ea37ec9c03d7d20681c1982cae
SH256 hash:
a49de74ebf96a18c982863429dd94d26b5ff809c61871802ac71de90cdae2bca
MD5 hash:
298424b6a72ef8809e3503c1e01a3c1a
SHA1 hash:
e4b0227c6c0bec682aeb69b93380a2fbb04691fc
SH256 hash:
7227c5067dc82a381a3c7485a21c64b702f7e987a46d1349f95e269399e862eb
MD5 hash:
6d9b2f0e4a7c5a70ed72203c642ea152
SHA1 hash:
c0780ed446880bde3570bb4627c29d2c38286b92
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments