MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 81b156ce5e3c46a2c484bb746dbb3e99265e26f94c64df933f4f27c6548ebe62. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: 81b156ce5e3c46a2c484bb746dbb3e99265e26f94c64df933f4f27c6548ebe62
SHA3-384 hash: 7232802151d4a2b9a875deccd67fbba8e37b405d60fb2e227ace2443b9f88fedcab3b71c76554145c77f2de56ebd06f1
SHA1 hash: 259290b9c2b503925548f0359958081a65d4133d
MD5 hash: be11d0e8301c9d2484d134c56ecec54a
humanhash: cup-zebra-seventeen-nebraska
File name:be11d0e8301c9d2484d134c56ecec54a.exe
Download: download sample
Signature RedLineStealer
File size:1'067'008 bytes
First seen:2023-11-10 23:45:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:KymvxkW9T/YbLepaeJIsYCGGkf0DTq4cPY+aaVxu:RL+gbLveyNfGBfyVX
Threatray 114 similar samples on MalwareBazaar
TLSH T1D33523836FE49023EDB6677218FB0743063A7C515D7C93AF3641A46B9871E81A83277B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
195.10.205.16:1056

Intelligence


File Origin
# of uploads :
1
# of downloads :
310
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Sending a custom TCP request
Searching for the browser window
Searching for the window
DNS request
Behavior that indicates a threat
Reading critical registry keys
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer greyware installer installer lolbin lolbin packed remote rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, Mystic Stealer, RedLine, Smoke
Detection:
malicious
Classification:
phis.troj.adwa.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Contains functionality to modify clipboard data
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found API chain indicative of sandbox detection
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the hosts file
Multi AV Scanner detection for dropped file
PE file contains section with special chars
PE file has a writeable .text section
Phishing site detected (based on logo match)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Stop multiple services
Suspicious execution chain found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Glupteba
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1340946 Sample: CghDR86yMo.exe Startdate: 11/11/2023 Architecture: WINDOWS Score: 100 167 Found malware configuration 2->167 169 Malicious sample detected (through community Yara rule) 2->169 171 Antivirus detection for URL or domain 2->171 173 16 other signatures 2->173 12 CghDR86yMo.exe 1 4 2->12         started        15 rundll32.exe 2->15         started        17 rundll32.exe 2->17         started        process3 file4 121 C:\Users\user\AppData\Local\...\oT8mI37.exe, PE32 12->121 dropped 123 C:\Users\user\AppData\Local\...\7On7ZD91.exe, PE32 12->123 dropped 19 oT8mI37.exe 1 4 12->19         started        process5 file6 95 C:\Users\user\AppData\Local\...\Pa3ac71.exe, PE32 19->95 dropped 97 C:\Users\user\AppData\Local\...\3Up40Wr.exe, PE32 19->97 dropped 175 Antivirus detection for dropped file 19->175 177 Machine Learning detection for dropped file 19->177 23 3Up40Wr.exe 19->23         started        26 Pa3ac71.exe 1 4 19->26         started        signatures7 process8 file9 179 Antivirus detection for dropped file 23->179 181 Multi AV Scanner detection for dropped file 23->181 183 Machine Learning detection for dropped file 23->183 187 5 other signatures 23->187 29 explorer.exe 23->29 injected 117 C:\Users\user\AppData\Local\...\2iD6569.exe, PE32 26->117 dropped 119 C:\Users\user\AppData\Local\...\1rJ08yD1.exe, PE32 26->119 dropped 185 Binary is likely a compiled AutoIt script file 26->185 34 1rJ08yD1.exe 12 26->34         started        36 2iD6569.exe 1 26->36         started        signatures10 process11 dnsIp12 151 103.152.79.123 TWIDC-AS-APTWIDCLimitedHK unknown 29->151 153 185.174.136.219 SUPERSERVERSDATACENTERRU Russian Federation 29->153 155 8 other IPs or domains 29->155 125 C:\Users\user\AppData\Roaming\rghgwbs, PE32 29->125 dropped 127 C:\Users\user\AppData\Local\Temp\F395.exe, PE32+ 29->127 dropped 129 C:\Users\user\AppData\Local\Temp\D2BF.exe, PE32 29->129 dropped 131 6 other malicious files 29->131 dropped 241 System process connects to network (likely due to code injection or exploit) 29->241 243 Benign windows process drops PE files 29->243 245 Adds a directory exclusion to Windows Defender 29->245 247 Hides that the sample has been downloaded from the Internet (zone.identifier) 29->247 38 D2BF.exe 29->38         started        42 995D.exe 29->42         started        44 A842.exe 29->44         started        53 3 other processes 29->53 249 Binary is likely a compiled AutoIt script file 34->249 251 Machine Learning detection for dropped file 34->251 253 Found API chain indicative of sandbox detection 34->253 255 Contains functionality to modify clipboard data 34->255 47 chrome.exe 34->47         started        49 chrome.exe 9 34->49         started        55 8 other processes 34->55 257 Contains functionality to inject code into remote processes 36->257 259 Writes to foreign memory regions 36->259 261 Allocates memory in foreign processes 36->261 263 Injects a PE file into a foreign processes 36->263 51 AppLaunch.exe 12 36->51         started        57 2 other processes 36->57 file13 signatures14 process15 dnsIp16 99 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 38->99 dropped 101 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 38->101 dropped 103 C:\Users\user\AppData\...\InstallSetup5.exe, PE32 38->103 dropped 105 C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32 38->105 dropped 189 Antivirus detection for dropped file 38->189 191 Multi AV Scanner detection for dropped file 38->191 193 Machine Learning detection for dropped file 38->193 195 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 38->195 59 toolspub2.exe 38->59         started        62 31839b57a4f11171d6abc8bbc4451ee4.exe 38->62         started        71 4 other processes 38->71 107 C:\Users\user\...\TYNYPfQhNJTuKRy.data, PE32 42->107 dropped 109 C:\Users\user\...\KAsJKwtGgtReoJa.data, PE32 42->109 dropped 197 Writes to foreign memory regions 42->197 199 Allocates memory in foreign processes 42->199 201 Injects a PE file into a foreign processes 42->201 64 jsc.exe 42->64         started        141 194.49.94.80 EQUEST-ASNL unknown 44->141 203 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 44->203 205 Found many strings related to Crypto-Wallets (likely being stolen) 44->205 207 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 44->207 209 Tries to steal Crypto Currency Wallets 44->209 67 conhost.exe 44->67         started        211 Suspicious execution chain found 47->211 213 Adds a directory exclusion to Windows Defender 47->213 69 chrome.exe 47->69         started        143 192.168.2.5 unknown unknown 49->143 145 239.255.255.250 unknown Reserved 49->145 74 3 other processes 49->74 147 5.42.92.43 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 51->147 149 194.49.94.11 EQUEST-ASNL unknown 53->149 76 5 other processes 53->76 78 8 other processes 55->78 file17 signatures18 process19 dnsIp20 215 Multi AV Scanner detection for dropped file 59->215 217 Detected unpacking (changes PE section rights) 59->217 219 Machine Learning detection for dropped file 59->219 221 Injects a PE file into a foreign processes 59->221 80 toolspub2.exe 59->80         started        223 Detected unpacking (overwrites its own PE header) 62->223 225 Found Tor onion address 62->225 227 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 62->227 83 cmd.exe 62->83         started        133 194.169.175.235 CLOUDCOMPUTINGDE Germany 64->133 229 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 64->229 231 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 64->231 233 Tries to harvest and steal browser information (history, passwords, etc) 64->233 235 Tries to steal Crypto Currency Wallets 64->235 111 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 71->111 dropped 113 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 71->113 dropped 115 C:\Windows\System32\drivers\etc\hosts, ASCII 71->115 dropped 237 Modifies the hosts file 71->237 239 Adds a directory exclusion to Windows Defender 71->239 85 Broom.exe 71->85         started        135 104.244.42.130 TWITTERUS United States 74->135 137 104.244.42.131 TWITTERUS United States 74->137 139 77 other IPs or domains 74->139 file21 signatures22 process23 signatures24 157 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 80->157 159 Maps a DLL or memory area into another process 80->159 161 Checks if the current machine is a virtual machine (disk enumeration) 80->161 163 Creates a thread in another existing process (thread injection) 80->163 87 conhost.exe 83->87         started        89 fodhelper.exe 83->89         started        91 fodhelper.exe 83->91         started        93 fodhelper.exe 83->93         started        165 Multi AV Scanner detection for dropped file 85->165 process25
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2023-11-10 23:46:05 UTC
File Type:
PE (Exe)
Extracted files:
137
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:mystic family:redline family:sectoprat family:smokeloader family:zgrat botnet:@ytlogsbot botnet:pixelnew2.0 botnet:taiga botnet:up3 backdoor brand:paypal dropper evasion infostealer loader persistence phishing rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Launches sc.exe
AutoIT Executable
Detected potential entity reuse from brand paypal.
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Downloads MZ/PE file
Modifies Windows Firewall
Stops running service(s)
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SmokeLoader
ZGRat
Detect Mystic stealer payload
Detect ZGRat V1
Glupteba
Glupteba payload
Mystic
Malware Config
C2 Extraction:
http://5.42.92.190/fks/index.php
5.42.92.51:19057
194.49.94.11:80
194.169.175.235:42691
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
a7f66057e50910d96a36424eb4da3de8b9cd4a306f9ab0b59362f27409f91e35
MD5 hash:
f562aaab6ca23d0e9b0846e4ed2e2705
SHA1 hash:
c8fc45ff9b31f44f4f79f2f8601ef95146769aae
SH256 hash:
75f00f8a2b3c1a815ccb5dcf5c0fe046aebdf02349b27602f2b227d9dcfd984c
MD5 hash:
b9bbd1b67556893ccdc432cda9aec829
SHA1 hash:
6d92ec59b507ec2576baa469ffbdcd16dde72b3d
SH256 hash:
81b156ce5e3c46a2c484bb746dbb3e99265e26f94c64df933f4f27c6548ebe62
MD5 hash:
be11d0e8301c9d2484d134c56ecec54a
SHA1 hash:
259290b9c2b503925548f0359958081a65d4133d
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 81b156ce5e3c46a2c484bb746dbb3e99265e26f94c64df933f4f27c6548ebe62

(this sample)

  
Delivery method
Distributed via web download

Comments