MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 823d20bc56d35800ceb4badae0103cfaa2f0b1f5849674e34d1a0fcaf3cbcfd3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 3 File information Comments

SHA256 hash: 823d20bc56d35800ceb4badae0103cfaa2f0b1f5849674e34d1a0fcaf3cbcfd3
SHA3-384 hash: 86cb1e0ffbfa3db734d0c3f0fce5df2584c343916fe4a7c22a78d31416548101fe8a83b669b08522cfdad14ef644e50c
SHA1 hash: 6ead11e3138862c52ecf7d65e9024b1b3e7317bd
MD5 hash: a1b864d25e9e54c70d7e2ca49a5d8765
humanhash: zebra-connecticut-moon-queen
File name:823D20BC56D35800CEB4BADAE0103CFAA2F0B1F584967.exe
Download: download sample
Signature RedLineStealer
File size:1'248'768 bytes
First seen:2022-10-25 06:26:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash da0a8429d07681e0f845d1d4f08ae833 (28 x RedLineStealer, 2 x ArkeiStealer, 1 x PhoenixStealer)
ssdeep 24576:hrxrOi/Tnnt1YGYBuA+UahOxMCRzd8Yt/osOQeDFZ:l5Oajnef3zQsHeDF
Threatray 1'109 similar samples on MalwareBazaar
TLSH T110454C3AE70615B4D7635772C68EFA7B9B147A248032AE3FFF4AD90CA4334127C85256
TrID 44.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
23.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.4% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://78.47.204.168/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://78.47.204.168/ https://threatfox.abuse.ch/ioc/891320/

Intelligence


File Origin
# of uploads :
1
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
823D20BC56D35800CEB4BADAE0103CFAA2F0B1F584967.exe
Verdict:
Malicious activity
Analysis date:
2022-10-25 06:29:05 UTC
Tags:
trojan rat redline loader stealer vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Launching a process
Creating a window
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 729908 Sample: 823D20BC56D35800CEB4BADAE01... Startdate: 25/10/2022 Architecture: WINDOWS Score: 100 117 t.me 2->117 119 clipper.guru 2->119 131 Snort IDS alert for network traffic 2->131 133 Malicious sample detected (through community Yara rule) 2->133 135 Antivirus detection for dropped file 2->135 137 10 other signatures 2->137 11 823D20BC56D35800CEB4BADAE0103CFAA2F0B1F584967.exe 1 2->11         started        14 chrome.exe 2->14         started        16 svcupdater.exe 2->16         started        18 chrome.exe 2->18         started        signatures3 process4 signatures5 167 Contains functionality to inject code into remote processes 11->167 169 Writes to foreign memory regions 11->169 171 Injects a PE file into a foreign processes 11->171 20 AppLaunch.exe 15 10 11->20         started        25 conhost.exe 11->25         started        173 Drops executables to the windows directory (C:\Windows) and starts them 14->173 175 Allocates memory in foreign processes 14->175 177 Adds a directory exclusion to Windows Defender 14->177 179 Sample uses process hollowing technique 14->179 27 powershell.exe 14->27         started        29 schtasks.exe 14->29         started        31 schtasks.exe 14->31         started        33 GoogleUpdate.exe 14->33         started        181 Multi AV Scanner detection for dropped file 16->181 183 Machine Learning detection for dropped file 16->183 35 powershell.exe 18->35         started        37 schtasks.exe 18->37         started        process6 dnsIp7 121 62.204.41.141, 24758, 49701 TNNET-ASTNNetOyMainnetworkFI United Kingdom 20->121 123 adigitalshop.com 151.106.122.215, 443, 49703 PLUSSERVER-ASN1DE Germany 20->123 125 2 other IPs or domains 20->125 101 C:\Users\user\AppData\Local\...\test.exe, PE32 20->101 dropped 103 C:\Users\user\AppData\Local\...\ofg.exe, PE32 20->103 dropped 105 C:\Users\user\AppData\Local\...\chrome.exe, MS-DOS 20->105 dropped 107 C:\Users\user\AppData\Local\...\brave.exe, PE32+ 20->107 dropped 139 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->139 141 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 20->141 143 Tries to harvest and steal browser information (history, passwords, etc) 20->143 145 Tries to steal Crypto Currency Wallets 20->145 39 chrome.exe 20->39         started        43 ofg.exe 5 20->43         started        45 brave.exe 20->45         started        47 test.exe 1 20->47         started        49 conhost.exe 27->49         started        51 conhost.exe 29->51         started        53 conhost.exe 31->53         started        55 conhost.exe 35->55         started        file8 signatures9 process10 file11 109 C:\WindowsbehaviorgraphoogleUpdate.exe, PE32 39->109 dropped 147 Multi AV Scanner detection for dropped file 39->147 149 Detected unpacking (changes PE section rights) 39->149 151 Machine Learning detection for dropped file 39->151 155 4 other signatures 39->155 57 GoogleUpdate.exe 39->57         started        60 GoogleUpdate.exe 39->60         started        63 powershell.exe 39->63         started        73 3 other processes 39->73 111 C:\Users\user\AppData\...\svcupdater.exe, PE32 43->111 dropped 65 cmd.exe 43->65         started        113 C:\Users\user\AppData\Local\Temp\708.tmp, PE32+ 45->113 dropped 115 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 45->115 dropped 153 Adds a directory exclusion to Windows Defender 45->153 67 powershell.exe 45->67         started        69 cmd.exe 45->69         started        71 cmd.exe 45->71         started        75 2 other processes 47->75 signatures12 process13 dnsIp14 157 Detected unpacking (changes PE section rights) 57->157 159 Detected unpacking (overwrites its own PE header) 57->159 161 Uses netsh to modify the Windows network and firewall settings 57->161 163 Modifies the windows firewall 57->163 127 api.peer2profit.com 172.66.40.196, 443, 49705, 49707 CLOUDFLARENETUS United States 60->127 129 162.19.175.139, 443, 49706, 49708 CENTURYLINK-US-LEGACY-QWESTUS United States 60->129 77 netsh.exe 60->77         started        79 netsh.exe 60->79         started        81 netsh.exe 60->81         started        83 conhost.exe 63->83         started        165 Uses schtasks.exe or at.exe to add and modify task schedules 65->165 85 conhost.exe 65->85         started        87 schtasks.exe 65->87         started        89 conhost.exe 67->89         started        91 conhost.exe 69->91         started        93 2 other processes 73->93 signatures15 process16 process17 95 conhost.exe 77->95         started        97 conhost.exe 79->97         started        99 conhost.exe 81->99         started       
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-09-14 18:57:26 UTC
File Type:
PE (Exe)
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:vidar botnet:1707 evasion infostealer spyware stealer upx
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Stops running service(s)
UPX packed file
Modifies security service
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
62.204.41.141:24758
https://t.me/slivetalks
https://c.im/@xinibin420
Unpacked files
SH256 hash:
35b8ca231b326bf908935c6edc6b38756baba704feda259096ebcb984a85913a
MD5 hash:
e67c7b6718098b1cb2d16d7c4aa85b1f
SHA1 hash:
2146233c05d02598a9f73d2a2a1e0cf7fbd1ac03
Detections:
redline
SH256 hash:
823d20bc56d35800ceb4badae0103cfaa2f0b1f5849674e34d1a0fcaf3cbcfd3
MD5 hash:
a1b864d25e9e54c70d7e2ca49a5d8765
SHA1 hash:
6ead11e3138862c52ecf7d65e9024b1b3e7317bd
Malware family:
RedLine.D
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments