MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 781824a03b746fbeedba42ceba949da4f93388bfd3c7eae4ab560417fd128a40. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 10 File information Comments

SHA256 hash: 781824a03b746fbeedba42ceba949da4f93388bfd3c7eae4ab560417fd128a40
SHA3-384 hash: e96ea030835bb9789660832e81e153ce770401e874d7b8f78fe63866d1de1211b681c11fae288c13ad5d4fb18b2f8d46
SHA1 hash: f990eef90be40471bde64df1acddeda15e86947c
MD5 hash: a0183ddc59605205f37af101460de5c2
humanhash: lion-social-uniform-snake
File name:a0183ddc59605205f37af101460de5c2.exe
Download: download sample
Signature RedLineStealer
File size:10'820'578 bytes
First seen:2021-11-20 04:35:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 196608:xNLUCgjYQqAMer5G65P/KL1jPvNO0YsvFiwyHhlNKYH+5WE3vOeWg4TTGWg8cmiY:xFdgsQDr5FRIjP/rvFcHhlNtmWEfb14V
Threatray 722 similar samples on MalwareBazaar
TLSH T14CB63316B992A9F6D704347C076C93B692694BA86FC04D0B1B70464D6F79CF0D33FA8A
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
77.232.40.51:20166

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
77.232.40.51:20166 https://threatfox.abuse.ch/ioc/251021/

Intelligence


File Origin
# of uploads :
1
# of downloads :
166
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a0183ddc59605205f37af101460de5c2.exe
Verdict:
No threats detected
Analysis date:
2021-11-20 04:41:01 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
DNS request
Using the Windows Management Instrumentation requests
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys mokes overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Generic malware Metasploit RedLine Socel
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Metasploit Payload
Yara detected RedLine Stealer
Yara detected Socelars
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 525487 Sample: BPjUXSEwuL.exe Startdate: 20/11/2021 Architecture: WINDOWS Score: 100 59 208.95.112.1 TUT-ASUS United States 2->59 61 104.208.16.94 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->61 63 4 other IPs or domains 2->63 77 Multi AV Scanner detection for domain / URL 2->77 79 Antivirus detection for URL or domain 2->79 81 Antivirus detection for dropped file 2->81 83 19 other signatures 2->83 9 BPjUXSEwuL.exe 22 2->9         started        signatures3 process4 file5 41 C:\Users\user\AppData\...\setup_install.exe, PE32 9->41 dropped 43 C:\Users\user\...\Wed14ee130a604e2a.exe, PE32 9->43 dropped 45 C:\Users\user\AppData\...\Wed14e8848dc0a8.exe, PE32 9->45 dropped 47 17 other files (10 malicious) 9->47 dropped 12 setup_install.exe 1 9->12         started        process6 signatures7 103 Adds a directory exclusion to Windows Defender 12->103 105 Disables Windows Defender (via service or powershell) 12->105 15 cmd.exe 12->15         started        17 cmd.exe 1 12->17         started        19 cmd.exe 1 12->19         started        22 7 other processes 12->22 process8 signatures9 24 Wed14176d754ef7d838.exe 15->24         started        29 Wed14e8848dc0a8.exe 2 17->29         started        85 Adds a directory exclusion to Windows Defender 19->85 87 Disables Windows Defender (via service or powershell) 19->87 31 powershell.exe 23 19->31         started        33 Wed14773c6ddc763638.exe 22->33         started        35 Wed143f08e2d21bc4.exe 22->35         started        37 Wed14df9919150a4ecf2.exe 22->37         started        39 2 other processes 22->39 process10 dnsIp11 65 103.155.93.165 TWIDC-AS-APTWIDCLimitedHK unknown 24->65 67 212.193.30.29 SPD-NETTR Russian Federation 24->67 75 12 other IPs or domains 24->75 49 C:\Users\...\jDMPDmjH99pP3YVGi5WtU1jD.exe, PE32 24->49 dropped 51 C:\Users\...\OvMgH67Ss2lD1EHjyAWaQvxZ.exe, PE32+ 24->51 dropped 53 C:\Users\user\AppData\...\search1001[1].exe, PE32 24->53 dropped 57 30 other files (8 malicious) 24->57 dropped 89 Antivirus detection for dropped file 24->89 91 Tries to harvest and steal browser information (history, passwords, etc) 24->91 93 Disable Windows Defender real time protection (registry) 24->93 95 Machine Learning detection for dropped file 29->95 97 Sample uses process hollowing technique 29->97 99 Injects a PE file into a foreign processes 29->99 55 C:\Users\user\...\Wed14773c6ddc763638.tmp, PE32 33->55 dropped 101 Obfuscated command line found 33->101 69 5.9.162.45 HETZNER-ASDE Germany 37->69 71 149.28.253.196 AS-CHOOPAUS United States 37->71 73 192.168.2.1 unknown unknown 37->73 file12 signatures13
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2021-11-18 19:35:00 UTC
AV detection:
21 of 27 (77.78%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:metasploit family:redline family:smokeloader family:socelars botnet:media17plus botnet:user2121 aspackv2 backdoor infostealer stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
MetaSploit
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Malware Config
C2 Extraction:
91.121.67.60:51630
http://www.gianninidesign.com/
http://membro.at/upload/
http://jeevanpunetha.com/upload/
http://misipu.cn/upload/
http://zavodooo.ru/upload/
http://targiko.ru/upload/
http://vues3d.com/upload/
135.181.129.119:4805
Unpacked files
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
04fb4fddfaacc0a8a935b7a12ffc19aa338d2d7d713aba92360b0b256a990df7
MD5 hash:
adcd7f9d6c55204b0d3b08add98e7aea
SHA1 hash:
fd938b29f7c2cfa6490cb85d6898f022272ec5f6
SH256 hash:
482de11adc210324d74ba13f95fdf34c8b6a7e92f209fbb172855e1003af7858
MD5 hash:
fd242822d5995efb93c6c6476fdb440b
SHA1 hash:
f678167985de918caa885187ded6371f86c6d67c
SH256 hash:
f121f75a402c5abd96769b873c1ee15da3cb154d3760a5ce22abf37b1b5048ab
MD5 hash:
366eb7679f9adbc4065158bb1ce4fae8
SHA1 hash:
f286806f844bbb728ed3db43ca4e1c00c2b83ad3
SH256 hash:
199b2760ea58e930c7f2f2a4291b0faae59abd9948a35e568eca5a16a40cacf8
MD5 hash:
0b1b2dd10df776f8145eef517718ae0b
SHA1 hash:
d1a49cfcdda7f9487fe9864c2d1897772b4a1323
SH256 hash:
ad8f8f9711ceb9d68301ade7a9ce11515b2e41040dcda0318ae707edb43655de
MD5 hash:
3c49dcfebc82681cd5d3551835257e23
SHA1 hash:
cfe42ee156805845bc3b7250f701061e4aa00dee
SH256 hash:
6b73b3577cd14c31257b07f8bed7758f1b9415fb8370caecfff6926308e07397
MD5 hash:
60ef7227ab215884ff8dda2ca87b207b
SHA1 hash:
cd1d91dfac9beaee5559b9f9e1bdfbe12e175f39
SH256 hash:
2e8827d3c1a915736cfc712981cdddce167e62b5575dd33cdc62fa50aaf52387
MD5 hash:
3c63634fe0d4c66cab4c76db46a2e096
SHA1 hash:
a22703e50c1c62321e38c16d76d02fb4aa2f76cd
SH256 hash:
db7a2d8d4f67ebd1d4a848278dfb7708a91d46e46483cfa55d4c869ec57dcd1a
MD5 hash:
d098294dbf4e4a4ef7a237c6acff9314
SHA1 hash:
30798998acfb52bba1818cbaf165ec1fbc53bb29
SH256 hash:
f4f197b369950b45a5b37e3812a847e2afc130132a907e93f345585840ca3920
MD5 hash:
81453ac2996e2d62a3458363cc1f1245
SHA1 hash:
1bf5060c25b848c44cb3bb1c4f29e9d5d9832364
SH256 hash:
af6917221f89e6614a4b099b088b2dbc870de90d8734ad51cd9c02928b49eed6
MD5 hash:
5d4a51e96c1cd7cf51fdf8d8ba2faa72
SHA1 hash:
0850d552654fc34a08215654145be2ec84656a32
SH256 hash:
1bbf1271ce5c9dc20b595fdf1f516166f65b443599fc835607008666296983ff
MD5 hash:
49fc2ee06ab4c4b533cf9ce484c02adf
SHA1 hash:
b90f22613578232b8bf377377ea5c4d84b37b0a7
Detections:
win_zloader_g1
Parent samples :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 hash:
4feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
MD5 hash:
ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1 hash:
f61d31d176ba67cfff4f0cab04b4b2d19df91684
SH256 hash:
33de629e0e0f507c1c8a4b9c673def9c2a6d773f660bfd01c73cd205a106a1e1
MD5 hash:
b6c41af0346d741f6a86cd026d99ce02
SHA1 hash:
5eefd3734574a52580691e3acf5983dca10d2f4e
SH256 hash:
376bf69f01fe65802f1ec35b8715067687c4bd47937154fc4c3903b06fe89a92
MD5 hash:
feea5b4bc6a46188e7998b53b668d6fe
SHA1 hash:
ff73a76d88ba96baba23acf669ab2fb61e541916
SH256 hash:
9c2c48674acd7e979c7690cb0cc15687a35b8dd19840231e71d15f6a38036c34
MD5 hash:
8f08c17470ef41e6951906389a5c16f4
SHA1 hash:
91dcd2d0693eaa4327573f2e7c8a6aecee156f3e
SH256 hash:
93c4cba30e4e919db036ca03b25885094ff34caf6a52125dc5647c16c454e700
MD5 hash:
f0380d884cef856b846e2128714e63be
SHA1 hash:
a51466452c7ad1b604335cfcf00f6547ba326dfb
SH256 hash:
5f462653fe69f9d09cad542f7f98188788a965748ddd80da789ab1c010fce696
MD5 hash:
4d56817298114b1a9d95edbd71b6fd70
SHA1 hash:
3b80721ba32f0f3d5801415095c80eedd7cd4488
SH256 hash:
64604d5e47eb0808f00b1b52e07ea4aab9f18359fd39985e3a6b4a7211ea154d
MD5 hash:
b1d0a03cc3b3b3c093b08583f55f6757
SHA1 hash:
3231b4b2e4880cc297c75b107f81fe28b080b189
SH256 hash:
62bf3a96cffb984308fdbde26f549aecb517b8269c4a47e1ca6ba8cf323bdef2
MD5 hash:
2849136369812ce34c7d4621bed7e93b
SHA1 hash:
0a3f1bf4eea1e56dff701fc3463f33a0bd112325
SH256 hash:
57d2882007a7367f5f45697e70dfe842f8f9758fb7e7e9acba4838caa3a2e75a
MD5 hash:
871580ef0940fbed65e2e8ff48781d36
SHA1 hash:
833c749dec7a84d5e0d626c688e8c356075fa8ff
SH256 hash:
70d9f463528d4298adb2521bf99e7b43484a1f9b43930b2007b7f63561f2232e
MD5 hash:
b521c22230d96fc3801ecb2bd365d6fb
SHA1 hash:
ea2bed8484557b3c7055d1327ac5cdc88920ff91
SH256 hash:
f3178974730f09e1aa17ee2feb0fbfd4fa977f6eae25bbc42afd2c0f5829e94c
MD5 hash:
cae457a1e133169ed0aa929690ef0e38
SHA1 hash:
53f3c551c7354e1cd4638c311017395ae8256706
SH256 hash:
4b05ce89ddcaf47b58aab0f62e6a0a03cb295830afbc0a16671b477f1bed3b45
MD5 hash:
aed0fd4a7096c373260fb0a6076e955c
SHA1 hash:
b1b1d6c9a1c6a39d30c4bc8f16eaec4b0a585241
SH256 hash:
a528b53d5b1779e5f5388237cd5715ed2f9efe747d1eed0a5933f9b0344d9c0c
MD5 hash:
17225099d3833b83855b52fd27ede695
SHA1 hash:
82474a85c036560679715142d580d34afc123625
SH256 hash:
7dcd431aeb49899cb2c10cf9c83758224cd275e1ec89215ce907d87c06e3d721
MD5 hash:
7a0bb117fd916377690f0161d0acd71f
SHA1 hash:
5c04353b58384c785c72e67964b7b187238ae239
SH256 hash:
24b24e24237778e638d6730c73558d95a0dcf0f6fa88d7b57d6b7579985db0ea
MD5 hash:
e22f7fa6be165f81f7940e522cf0f432
SHA1 hash:
59fcd687f24c0fb72c45e1b77df6230cff71feb2
SH256 hash:
3a64edb7c2d9f96849ecd17ab3244f038f592f5cf114fdc05ed1cb786d240c00
MD5 hash:
e143e492699bc60a00594f3d06e89d48
SHA1 hash:
6d138ff8de930abc16de78de1f8de068f131df39
SH256 hash:
781824a03b746fbeedba42ceba949da4f93388bfd3c7eae4ab560417fd128a40
MD5 hash:
a0183ddc59605205f37af101460de5c2
SHA1 hash:
f990eef90be40471bde64df1acddeda15e86947c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SandboxHookingDLL
Author:ditekSHen
Description:Detects binaries and memory artifcats referencing sandbox DLLs typically observed in sandbox evasion
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Raccoon stealer payload
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments