MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d73739607de106b41bbef7d476e9d532e697157260e6d23c3ce8c2be446c8cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 7d73739607de106b41bbef7d476e9d532e697157260e6d23c3ce8c2be446c8cd
SHA3-384 hash: 2ef06e53bba57034c5cc749b12f60f1288b039dac1ae20d5acd206f6ffc8058bec78ed91e757a249115819c585705a6f
SHA1 hash: efa7b151a98ba5ff34f53c2dea99d90a32b4bf37
MD5 hash: a146573fe7e0882b23b9dbabc0333a7b
humanhash: floor-mobile-april-august
File name:file
Download: download sample
Signature RedLineStealer
File size:1'487'360 bytes
First seen:2023-10-12 13:46:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:7yr6kvnoJa/5aDmOcs7ISsiek5U1dRdzE84Bxze4JmJAyyhdheR59IxN6eHz:u5Va60IF7k5U3js1m9yhdg2xse
Threatray 916 similar samples on MalwareBazaar
TLSH T1C2652323A6D89027F8766FB054F256A31D367CE7DC7C9DDB22C5A90C68222C19932377
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://77.91.68.249/navi/kur90.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
291
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-10-12 13:47:35 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching the default Windows debugger (dwwin.exe)
Launching a service
Sending a custom TCP request
Creating a file
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Gathering data
Verdict:
Likely Malicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Healer AVKiller
Verdict:
Malicious
Result
Threat name:
Amadey, Babadeda, Healer AV Disabler, My
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Healer AV Disabler
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1324728 Sample: file.exe Startdate: 12/10/2023 Architecture: WINDOWS Score: 100 150 api.ip.sb 2->150 152 www.google.com 2->152 154 8 other IPs or domains 2->154 170 Found malware configuration 2->170 172 Malicious sample detected (through community Yara rule) 2->172 174 Antivirus detection for URL or domain 2->174 176 17 other signatures 2->176 14 file.exe 1 4 2->14         started        17 rundll32.exe 2->17         started        19 wehfisv 2->19         started        signatures3 process4 file5 146 C:\Users\user\AppData\Local\...\Rf2he82.exe, PE32 14->146 dropped 148 C:\Users\user\AppData\Local\...\5yd9XM8.exe, PE32 14->148 dropped 21 Rf2he82.exe 1 4 14->21         started        process6 file7 114 C:\Users\user\AppData\Local\...\sd7ts10.exe, PE32 21->114 dropped 116 C:\Users\user\AppData\Local\...\4MC093Es.exe, PE32 21->116 dropped 178 Antivirus detection for dropped file 21->178 25 sd7ts10.exe 1 4 21->25         started        28 4MC093Es.exe 21->28         started        signatures8 process9 file10 122 C:\Users\user\AppData\Local\...\my5bA59.exe, PE32 25->122 dropped 124 C:\Users\user\AppData\Local\...\3PL33JH.exe, PE32 25->124 dropped 31 3PL33JH.exe 1 25->31         started        34 my5bA59.exe 1 4 25->34         started        204 Writes to foreign memory regions 28->204 206 Allocates memory in foreign processes 28->206 208 Injects a PE file into a foreign processes 28->208 37 AppLaunch.exe 28->37         started        40 conhost.exe 28->40         started        42 WerFault.exe 28->42         started        signatures11 process12 dnsIp13 234 Writes to foreign memory regions 31->234 236 Allocates memory in foreign processes 31->236 238 Injects a PE file into a foreign processes 31->238 44 AppLaunch.exe 31->44         started        47 conhost.exe 31->47         started        49 AppLaunch.exe 31->49         started        55 2 other processes 31->55 110 C:\Users\user\AppData\Local\...\2UP9700.exe, PE32 34->110 dropped 112 C:\Users\user\AppData\Local\...\1AK07Gf4.exe, PE32 34->112 dropped 51 1AK07Gf4.exe 34->51         started        53 2UP9700.exe 1 34->53         started        156 77.91.124.55, 19071, 49715, 49724 ECOTEL-ASRU Russian Federation 37->156 240 Found many strings related to Crypto-Wallets (likely being stolen) 37->240 242 Tries to harvest and steal browser information (history, passwords, etc) 37->242 file14 signatures15 process16 signatures17 210 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 44->210 212 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 44->212 214 Maps a DLL or memory area into another process 44->214 226 2 other signatures 44->226 57 explorer.exe 44->57 injected 62 ZM0nj0sR.exe 44->62         started        216 Multi AV Scanner detection for dropped file 51->216 218 Contains functionality to inject code into remote processes 51->218 220 Writes to foreign memory regions 51->220 64 AppLaunch.exe 9 1 51->64         started        66 WerFault.exe 22 16 51->66         started        222 Allocates memory in foreign processes 53->222 224 Injects a PE file into a foreign processes 53->224 68 AppLaunch.exe 12 53->68         started        70 WerFault.exe 21 16 53->70         started        72 conhost.exe 53->72         started        process18 dnsIp19 158 5.42.65.80, 49802, 49809, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 57->158 160 77.91.68.29, 49716, 49717, 49721 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 57->160 164 3 other IPs or domains 57->164 126 C:\Users\user\AppData\Local\TempEB5.exe, PE32 57->126 dropped 128 C:\Users\user\AppData\Local\Temp\DC13.exe, PE32 57->128 dropped 130 C:\Users\user\AppData\Local\Temp\C398.exe, PE32 57->130 dropped 136 9 other files (8 malicious) 57->136 dropped 180 System process connects to network (likely due to code injection or exploit) 57->180 182 Benign windows process drops PE files 57->182 184 Hides that the sample has been downloaded from the Internet (zone.identifier) 57->184 74 C398.exe 57->74         started        78 DC13.exe 57->78         started        80 cmd.exe 57->80         started        82 rundll32.exe 57->82         started        132 C:\Users\user\AppData\Local\...\iX4Zh1zm.exe, PE32 62->132 dropped 134 C:\Users\user\AppData\Local\...\3lx4MH60.exe, PE32 62->134 dropped 84 iX4Zh1zm.exe 62->84         started        186 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 64->186 188 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 64->188 190 Modifies windows update settings 64->190 192 2 other signatures 64->192 162 5.42.92.211, 49711, 49720, 49732 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 68->162 file20 signatures21 process22 file23 138 C:\Users\user\AppData\Local\...\qs7Nx3Hu.exe, PE32 74->138 dropped 140 C:\Users\user\AppData\Local\...\6VL39TK.exe, PE32 74->140 dropped 194 Antivirus detection for dropped file 74->194 196 Machine Learning detection for dropped file 74->196 86 qs7Nx3Hu.exe 74->86         started        198 Writes to foreign memory regions 78->198 200 Allocates memory in foreign processes 78->200 202 Injects a PE file into a foreign processes 78->202 89 conhost.exe 78->89         started        91 conhost.exe 80->91         started        142 C:\Users\user\AppData\Local\...\2SX352Hc.exe, PE32 84->142 dropped 144 C:\Users\user\AppData\Local\...\1Mr55Zg5.exe, PE32 84->144 dropped 93 1Mr55Zg5.exe 84->93         started        signatures24 process25 file26 118 C:\Users\user\AppData\Local\...\yx6Rm9cS.exe, PE32 86->118 dropped 120 C:\Users\user\AppData\Local\...\5Mt68CD.exe, PE32 86->120 dropped 96 yx6Rm9cS.exe 86->96         started        228 Writes to foreign memory regions 93->228 230 Allocates memory in foreign processes 93->230 232 Injects a PE file into a foreign processes 93->232 100 conhost.exe 93->100         started        102 AppLaunch.exe 93->102         started        104 WerFault.exe 93->104         started        signatures27 process28 file29 106 C:\Users\user\AppData\Local\...\ZM0nj0sR.exe, PE32 96->106 dropped 108 C:\Users\user\AppData\Local\...\4qe528Fs.exe, PE32 96->108 dropped 166 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 96->166 168 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 96->168 signatures30
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-10-12 14:04:27 UTC
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor evasion persistence trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Modifies Windows Defender Real-time Protection settings
SmokeLoader
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
dc9fb1c4ca1e443b60a08ff645f974c6dddb29b02ebd113bd9b2a5165c27365f
MD5 hash:
b974329ef1a6f7dbce907f7aa69d4c58
SHA1 hash:
bf7689fc766a9611a1d5ce89e97b970ad43d2ba4
SH256 hash:
331572091d4e2a7a80619316d4cdae5cc37ced196ec8a76c785ffe9d17a2a5a4
MD5 hash:
4ac4dbe0d0ebd200d22cd6ab39d90645
SHA1 hash:
46df812c0806b9e6428e088abea00ee0fe93c047
SH256 hash:
7d73739607de106b41bbef7d476e9d532e697157260e6d23c3ce8c2be446c8cd
MD5 hash:
a146573fe7e0882b23b9dbabc0333a7b
SHA1 hash:
efa7b151a98ba5ff34f53c2dea99d90a32b4bf37
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:mal_healer
Author:Nikos 'n0t' Totosis
Description:Payload disabling Windows AV
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments