MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 89d1cdba0f70d4e8e7d0864b377c1c32ac84f053f3c0e4d942476ad59d996c0f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: 89d1cdba0f70d4e8e7d0864b377c1c32ac84f053f3c0e4d942476ad59d996c0f
SHA3-384 hash: 7fc9d6ff413794ccfb6d3f1de258b39dc8111d90634f3d155d5e5a4fd4b79466b2ac7d71370df8ac37d150a336b2ad85
SHA1 hash: 23eb72cba95c4fb627beb02efdbbebde6863a60f
MD5 hash: c4d77784ddfc0e376b6cb6fa654a4f8d
humanhash: juliet-november-maryland-texas
File name:c4d77784ddfc0e376b6cb6fa654a4f8d.exe
Download: download sample
Signature RedLineStealer
File size:298'496 bytes
First seen:2022-03-22 19:42:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6bd64b13624a27b70b577055bad87689 (3 x RedLineStealer, 2 x Stop)
ssdeep 6144:Qq42iWma16ciqd4KG2Qx1FzU7tuLhXkDeLYim9tzoP8:FiWma1JdBBq9Uput0CLY19ty8
Threatray 176 similar samples on MalwareBazaar
TLSH T15F549E40B7A0D03DE1B712F8B976D3ACA52E79A05B24A1CF62D52BEE16342D0EC75347
File icon (PE):PE icon
dhash icon badacabecee6baa6 (95 x Stop, 87 x RedLineStealer, 62 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
142.132.184.130:15150

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
142.132.184.130:15150 https://threatfox.abuse.ch/ioc/439505/

Intelligence


File Origin
# of uploads :
1
# of downloads :
263
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Searching for synchronization primitives
Sending a custom TCP request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Sending an HTTP GET request
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
SystemUptime
MeasuringTime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-03-20 00:39:36 UTC
File Type:
PE (Exe)
Extracted files:
33
AV detection:
33 of 42 (78.57%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor discovery spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Deletes itself
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
SmokeLoader
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Malware Config
C2 Extraction:
http://coralee.at/upload/
http://ducvietcao.com/upload/
http://biz-acc.ru/upload/
http://toimap.com/upload/
http://bbb7d.com/upload/
http://piratia-life.ru/upload/
http://curvreport.com/upload/
http://viagratos.com/upload/
http://mordo.ru/upload/
http://pkodev.net/upload/
Unpacked files
SH256 hash:
89d1cdba0f70d4e8e7d0864b377c1c32ac84f053f3c0e4d942476ad59d996c0f
MD5 hash:
c4d77784ddfc0e376b6cb6fa654a4f8d
SHA1 hash:
23eb72cba95c4fb627beb02efdbbebde6863a60f
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments