MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8dda40a5568292661c1157e6edf3454e9fbf6d2215085b2ac39731276f1e83e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: 8dda40a5568292661c1157e6edf3454e9fbf6d2215085b2ac39731276f1e83e3
SHA3-384 hash: 71af7612f500acf4dadec4d04098e39c0a0350cf253daa72a347c61b0749866e2bb9e3ff5c5bda905735eccdd6118e7e
SHA1 hash: 17238afe79a445baf45cb5395a7a192b20beab01
MD5 hash: 38cbd9820e8528708c24ea761f0de8fe
humanhash: montana-oven-alaska-georgia
File name:38cbd9820e8528708c24ea761f0de8fe.exe
Download: download sample
Signature RedLineStealer
File size:344'064 bytes
First seen:2021-11-12 16:35:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5dd991f39183aef09270d722c5f3a923 (2 x RedLineStealer)
ssdeep 6144:YdRaRGnxDJqPVZZr9fp6NM87ROP5QF81I:JRGnJsPVZZrNcN7ROPKY
Threatray 5'340 similar samples on MalwareBazaar
TLSH T1FE748D10B7A0C034F1B312F84AB693BCB93E7AA19B6595CF52D516EA4734AE0EC31357
File icon (PE):PE icon
dhash icon badacabecee6baa6 (95 x Stop, 87 x RedLineStealer, 62 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
86.107.197.248:56626

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
86.107.197.248:56626 https://threatfox.abuse.ch/ioc/247483/

Intelligence


File Origin
# of uploads :
1
# of downloads :
149
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Writes to foreign memory regions
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 520728 Sample: WSWw3rqaqL.exe Startdate: 12/11/2021 Architecture: WINDOWS Score: 100 61 www.google.com 2->61 63 www-googletagmanager.l.google.com 2->63 65 23 other IPs or domains 2->65 81 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->81 83 Antivirus detection for URL or domain 2->83 85 Multi AV Scanner detection for dropped file 2->85 87 13 other signatures 2->87 10 WSWw3rqaqL.exe 2->10         started        12 ujuurbs 2->12         started        signatures3 process4 signatures5 15 WSWw3rqaqL.exe 10->15         started        131 Machine Learning detection for dropped file 12->131 133 Contains functionality to inject code into remote processes 12->133 135 Injects a PE file into a foreign processes 12->135 18 ujuurbs 12->18         started        process6 signatures7 137 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->137 139 Maps a DLL or memory area into another process 15->139 141 Checks if the current machine is a virtual machine (disk enumeration) 15->141 143 Creates a thread in another existing process (thread injection) 15->143 20 explorer.exe 19 15->20 injected process8 dnsIp9 67 216.128.137.31, 443, 49763, 49764 AS-CHOOPAUS United States 20->67 69 hajezey10.top 178.218.220.198, 49756, 49757, 49759 ESERVERRU Russian Federation 20->69 71 6 other IPs or domains 20->71 49 C:\Users\user\AppData\Roaming\ujuurbs, PE32 20->49 dropped 51 C:\Users\user\AppData\Roaming\iruurbs, PE32 20->51 dropped 53 C:\Users\user\AppData\Local\Temp\C1DC.exe, PE32 20->53 dropped 55 9 other malicious files 20->55 dropped 89 System process connects to network (likely due to code injection or exploit) 20->89 91 Benign windows process drops PE files 20->91 93 Deletes itself after installation 20->93 95 Hides that the sample has been downloaded from the Internet (zone.identifier) 20->95 25 5AF.exe 1 20->25         started        29 625.exe 20->29         started        31 40DD.exe 2 20->31         started        34 6 other processes 20->34 file10 signatures11 process12 dnsIp13 57 C:\Users\user\AppData\Local\Temp\1105.tmp, PE32 25->57 dropped 105 Multi AV Scanner detection for dropped file 25->105 107 DLL reload attack detected 25->107 109 Detected unpacking (changes PE section rights) 25->109 125 5 other signatures 25->125 111 Query firmware table information (likely to detect VMs) 29->111 113 Tries to detect sandboxes and other dynamic analysis tools (window names) 29->113 115 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 29->115 127 3 other signatures 29->127 36 AppLaunch.exe 29->36         started        75 45.9.20.149, 10844 DEDIPATH-LLCUS Russian Federation 31->75 117 Machine Learning detection for dropped file 31->117 129 2 other signatures 31->129 77 93.115.20.139, 28978, 49818 MVPShttpswwwmvpsnetEU Romania 34->77 79 cdn.discordapp.com 34->79 119 Antivirus detection for dropped file 34->119 121 Detected unpacking (overwrites its own PE header) 34->121 123 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 34->123 38 1FA8.exe 34->38         started        41 C1DC.exe 2 34->41         started        44 77D8.exe 34->44         started        47 2 other processes 34->47 file14 signatures15 process16 dnsIp17 97 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 38->97 99 Maps a DLL or memory area into another process 38->99 101 Checks if the current machine is a virtual machine (disk enumeration) 38->101 103 Creates a thread in another existing process (thread injection) 38->103 59 C:\Users\user\AppData\Local\Temp\ins.exe, PE32 41->59 dropped 73 telegin.top 44->73 file18 signatures19
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2021-11-11 18:04:00 UTC
AV detection:
27 of 27 (100.00%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:netsupport family:raccoon family:redline family:smokeloader botnet:1 botnet:8dec62c1db2959619dca43e02fa46ad7bd606400 botnet:intalls botnet:superstar backdoor discovery evasion infostealer rat spyware stealer themida trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
NSIS installer
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
NetSupport
Raccoon
RedLine
RedLine Payload
SmokeLoader
Malware Config
C2 Extraction:
http://nalirou70.top/
http://xacokuo80.top/
http://nusurtal4f.net/
http://netomishnetojuk.net/
http://escalivrouter.net/
http://nick22doom4.net/
http://wrioshtivsio.su/
http://nusotiso4.su/
http://rickkhtovkka.biz/
http://palisotoliso.net/
185.159.80.90:38637
185.215.113.29:36224
50.18.71.252:12081
144.202.123.191:49885
Unpacked files
SH256 hash:
cdb9c842ba86fc328ec80226975c54c24a3ee9868cbbaab14d2b651cc80e70e6
MD5 hash:
f7ff52793660cabb5ebd2bd4b9810336
SHA1 hash:
23e6a68262b479a1ff214b09dbfe159292475a22
SH256 hash:
8dda40a5568292661c1157e6edf3454e9fbf6d2215085b2ac39731276f1e83e3
MD5 hash:
38cbd9820e8528708c24ea761f0de8fe
SHA1 hash:
17238afe79a445baf45cb5395a7a192b20beab01
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 8dda40a5568292661c1157e6edf3454e9fbf6d2215085b2ac39731276f1e83e3

(this sample)

  
Delivery method
Distributed via web download

Comments