MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d101f56b6016f964ee94f8bca07ccfa836fdd369c4533c755befc184718082b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 1 File information Comments

SHA256 hash: 7d101f56b6016f964ee94f8bca07ccfa836fdd369c4533c755befc184718082b
SHA3-384 hash: 589ea21b9ca06b7eb905386d4036c302ce7a51e6e4fdc4e5bf2905837f8d01267ccaa90f6d45199435b63bbaaa017c8d
SHA1 hash: 502a0a2f9ffc8522a4046503e6c5ec00739135dc
MD5 hash: 0d95573fc4fd07b41fc494e8048b504f
humanhash: jig-neptune-colorado-kitten
File name:0d95573fc4fd07b41fc494e8048b504f.exe
Download: download sample
Signature RedLineStealer
File size:561'664 bytes
First seen:2023-09-27 19:26:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 12288:nMrjy90Ftw+cdYPhlPlZpMI0lfjgxe9jZkJGDPWPUKSoHhM:EyEwWlPlztIfMHJ6ISoHhM
Threatray 1'648 similar samples on MalwareBazaar
TLSH T1FCC41222A7F58572E8B407B04CFB13870A3ABDB62DBD53172791999E0C726C06D3572B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
77.91.124.55:19071

Intelligence


File Origin
# of uploads :
1
# of downloads :
305
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-09-20 17:12:03 UTC
Tags:
stealc stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Modifying a system executable file
Delayed writing of the file
Launching a process
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Infecting executable files
Unauthorized injection to a system process
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer greyware installer lolbin lolbin packed rundll32 setupapi shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Mystic Stealer, RedLine, SmokeLoader
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Phishing site detected (based on logo match)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1315504 Sample: ezu0cHYJ2l.exe Startdate: 27/09/2023 Architecture: WINDOWS Score: 100 124 www.google.com 2->124 126 clients2.google.com 2->126 128 2 other IPs or domains 2->128 156 Snort IDS alert for network traffic 2->156 158 Found malware configuration 2->158 160 Malicious sample detected (through community Yara rule) 2->160 162 11 other signatures 2->162 15 ezu0cHYJ2l.exe 1 4 2->15         started        signatures3 process4 file5 120 C:\Users\user\AppData\Local\...\b4771530.exe, PE32 15->120 dropped 122 C:\Users\user\AppData\Local\...\a8092193.exe, PE32 15->122 dropped 18 b4771530.exe 1 15->18         started        21 a8092193.exe 1 15->21         started        process6 signatures7 146 Antivirus detection for dropped file 18->146 148 Multi AV Scanner detection for dropped file 18->148 150 Writes to foreign memory regions 18->150 23 AppLaunch.exe 18->23         started        26 WerFault.exe 19 9 18->26         started        29 conhost.exe 18->29         started        152 Allocates memory in foreign processes 21->152 154 Injects a PE file into a foreign processes 21->154 31 AppLaunch.exe 21->31         started        33 WerFault.exe 23 9 21->33         started        35 hshgbre 21->35         started        37 2 other processes 21->37 process8 dnsIp9 170 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->170 172 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 23->172 174 Maps a DLL or memory area into another process 23->174 180 2 other signatures 23->180 39 explorer.exe 33 18 23->39 injected 136 192.168.2.1 unknown unknown 26->136 176 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->176 178 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 31->178 signatures10 process11 dnsIp12 132 77.91.68.29, 49793, 49796, 49933 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 39->132 134 77.91.68.52, 49794, 80 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 39->134 104 C:\Users\user\AppData\Roaming\hshgbre, PE32 39->104 dropped 106 C:\Users\user\AppData\Local\Temp\DECA.exe, PE32 39->106 dropped 108 C:\Users\user\AppData\Local\Temp\CC68.exe, PE32 39->108 dropped 110 3 other malicious files 39->110 dropped 204 System process connects to network (likely due to code injection or exploit) 39->204 206 Benign windows process drops PE files 39->206 208 Hides that the sample has been downloaded from the Internet (zone.identifier) 39->208 44 9B93.exe 4 39->44         started        48 DECA.exe 39->48         started        50 894F.exe 39->50         started        52 3 other processes 39->52 file13 signatures14 process15 file16 116 C:\Users\user\AppData\Local\...\x7213516.exe, PE32 44->116 dropped 118 C:\Users\user\AppData\Local\...\k3546069.exe, PE32 44->118 dropped 216 Antivirus detection for dropped file 44->216 218 Multi AV Scanner detection for dropped file 44->218 220 Machine Learning detection for dropped file 44->220 54 x7213516.exe 44->54         started        222 Writes to foreign memory regions 48->222 224 Allocates memory in foreign processes 48->224 226 Injects a PE file into a foreign processes 48->226 58 AppLaunch.exe 48->58         started        60 conhost.exe 48->60         started        62 conhost.exe 50->62         started        64 AppLaunch.exe 50->64         started        71 2 other processes 50->71 66 chrome.exe 52->66         started        69 chrome.exe 52->69         started        73 2 other processes 52->73 signatures17 process18 dnsIp19 100 C:\Users\user\AppData\Local\...\x8910251.exe, PE32 54->100 dropped 102 C:\Users\user\AppData\Local\...\j2744829.exe, PE32 54->102 dropped 182 Antivirus detection for dropped file 54->182 184 Multi AV Scanner detection for dropped file 54->184 186 Machine Learning detection for dropped file 54->186 75 x8910251.exe 54->75         started        188 Tries to harvest and steal browser information (history, passwords, etc) 58->188 130 239.255.255.250 unknown Reserved 66->130 79 chrome.exe 66->79         started        82 chrome.exe 69->82         started        file20 signatures21 process22 dnsIp23 112 C:\Users\user\AppData\Local\...\x7899235.exe, PE32 75->112 dropped 114 C:\Users\user\AppData\Local\...\i7157809.exe, PE32 75->114 dropped 210 Antivirus detection for dropped file 75->210 212 Multi AV Scanner detection for dropped file 75->212 214 Machine Learning detection for dropped file 75->214 84 x7899235.exe 75->84         started        140 www.google.com 172.217.13.100, 443, 49824, 49878 GOOGLEUS United States 79->140 142 accounts.google.com 172.217.13.109, 443, 49797, 49798 GOOGLEUS United States 79->142 144 10 other IPs or domains 79->144 file24 signatures25 process26 file27 96 C:\Users\user\AppData\Local\...\h7672944.exe, PE32 84->96 dropped 98 C:\Users\user\AppData\Local\...\g8175553.exe, PE32 84->98 dropped 164 Antivirus detection for dropped file 84->164 166 Multi AV Scanner detection for dropped file 84->166 168 Machine Learning detection for dropped file 84->168 88 g8175553.exe 84->88         started        91 h7672944.exe 84->91         started        signatures28 process29 dnsIp30 190 Multi AV Scanner detection for dropped file 88->190 192 Machine Learning detection for dropped file 88->192 194 Writes to foreign memory regions 88->194 202 2 other signatures 88->202 94 conhost.exe 88->94         started        138 77.91.124.55, 19071, 49819, 49827 ECOTEL-ASRU Russian Federation 91->138 196 Antivirus detection for dropped file 91->196 198 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 91->198 200 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 91->200 signatures31 process32
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-09-20 17:09:06 UTC
File Type:
PE (Exe)
Extracted files:
37
AV detection:
25 of 38 (65.79%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:healer family:mystic family:redline family:smokeloader botnet:gruha botnet:luate backdoor dropper evasion infostealer persistence stealer trojan
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Detects Healer an antivirus disabler dropper
Healer
Modifies Windows Defender Real-time Protection settings
Mystic
RedLine
SmokeLoader
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.55:19071
Unpacked files
SH256 hash:
6a53ce3cc85b1b0eefe1499532756fdeb938954714725287941f3761592d4015
MD5 hash:
1948f5f154ac8749054f701bebf5a304
SHA1 hash:
a5e35ff085be48d9470c14874a6ce1774bebc9ee
SH256 hash:
0d55fddf7813d41824f0e8c4d3c8a83e1e05d5166dee01f85beb977f68f29ed3
MD5 hash:
c989c7b5a441da7c0058cda2422d80eb
SHA1 hash:
853638f5e960eb73e65afd3608d0e7f24c06011d
SH256 hash:
7d101f56b6016f964ee94f8bca07ccfa836fdd369c4533c755befc184718082b
MD5 hash:
0d95573fc4fd07b41fc494e8048b504f
SHA1 hash:
502a0a2f9ffc8522a4046503e6c5ec00739135dc
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments