MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8eb464ddff8d1b4844641e7e1eefdcb9cd5830a3e63d19fe0c061db6a21b4405. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 8 File information Comments

SHA256 hash: 8eb464ddff8d1b4844641e7e1eefdcb9cd5830a3e63d19fe0c061db6a21b4405
SHA3-384 hash: f05f18e2b735ec6f014d593e710eaf2424e6f690d465d8c56dbf26b94974e5c294966ac90aa9c1393b1d08c31455c869
SHA1 hash: 1937bd66b1c9aeb2dd10561e8f20003d582c39a2
MD5 hash: afb09650da6a333eca094a9153723f47
humanhash: ohio-steak-edward-happy
File name:afb09650da6a333eca094a9153723f47.exe
Download: download sample
Signature RedLineStealer
File size:7'377'258 bytes
First seen:2022-02-02 19:16:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JC7WJJZbhWUDj56e5TNu0678KKAVF69UD3wnrG64aw/:J6WxbQsgQ/67dKAfhDWrG64Z
TLSH T14B7633632D961AF7FBF18B38053D17959C727005286CC06D97061ECB3EDA7492EEA329
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
116.203.252.195:22021

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
116.203.252.195:22021 https://threatfox.abuse.ch/ioc/377489/

Intelligence


File Origin
# of uploads :
1
# of downloads :
173
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Creating a window
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars onlyLogger
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Injuke
Status:
Malicious
First seen:
2022-01-31 07:54:02 UTC
File Type:
PE (Exe)
Extracted files:
435
AV detection:
33 of 43 (76.74%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:redline family:socelars botnet:v1user1 aspackv2 discovery infostealer persistence spyware stealer suricata
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Enumerates processes with tasklist
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
suricata: ET MALWARE ClipBanker Variant Activity (POST)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Malware Config
C2 Extraction:
http://www.tpyyf.com/
116.203.252.195:22021
Unpacked files
SH256 hash:
ea4a436cda457c2080e6f785e53919f14b6881790753c037383b5034fc88b5bb
MD5 hash:
c19f23dc3aa765c4d388c703880c5a39
SHA1 hash:
ca9dee28428a3d772e2e5b20cb9886f0db35811b
SH256 hash:
c578b4ca291f2b9bcb20137c146bb23d3220dda34226a97fe37e2cf021d8f3c0
MD5 hash:
da70ba6fa59896248f7c05fdcb7d581e
SHA1 hash:
174cb2b083e327a362b6ecac68fe939a40743ffb
SH256 hash:
9912e7f9e9c18f46e965ca48ed65de8a28de7d301336500aaa5fd461e948822f
MD5 hash:
32404da1b26037746f9bf0d5628ea968
SHA1 hash:
8d2bf53983638235d5cc2f81171839801ba02e84
SH256 hash:
e79ff194eb355b0ff63a5cfd5f6e94367ff2f267d60c9f2df6cbc844bd115e06
MD5 hash:
9d9c68549cf06b0485742e0865f5390c
SHA1 hash:
b23241ac8419df6bb0a930ac80cdae9edbd55893
SH256 hash:
6460754c17ab602b0ddfd2a82e637748b4a54139f6dbefa848ff01722a077acc
MD5 hash:
64638fe3e9d9acbcfe027bac3d0a7fab
SHA1 hash:
ff0d35497c4d6676a01a57db299df9847b382126
SH256 hash:
8a13f698d21786fc3fe5ce5e09fea10497551266eeec07fdf6abe3c55f9065d0
MD5 hash:
7db5edf513053778186311771126f449
SHA1 hash:
cf7143b4722932f329543f8b2c870753568e8e1a
SH256 hash:
474c9fc8b2e352497b55335f49c558ad2415f2f81ead253a512928d15406aea5
MD5 hash:
8490e18e04632ab9caabc81068118bc2
SHA1 hash:
cf624298c3aa3023f7d8a9b37d60ed12be0ddc08
SH256 hash:
559a787925ef30c1fb14cda16eff88571c82a381e4bed0e04d67d94ce0e599dd
MD5 hash:
cb4de0af0156eef48229850364613eef
SHA1 hash:
ba486209ed98a58dd32ccb0fdb33f47cbe94bf76
SH256 hash:
ecd1ba7beff437fedf4cf1e724829a5f7209896935c8dc9387a40b0acb69987a
MD5 hash:
609676a0a747ed2294a0fc07476b12c4
SHA1 hash:
9792b766e0e1c48f860d2e2833fc8f7d18ced51f
SH256 hash:
52296dd5fff7e1ec5f159ce7974ab53f17fd967836f6155ddac2fabbedb3e221
MD5 hash:
441673ba438d6820734e94ab2cf83801
SHA1 hash:
89833fc0dd88f077bc155efcfd85866c21706256
SH256 hash:
a4516e3b3589efa8ce00fb1f4fe6f7d5b41634356cb0c8fb8d88c36354304c90
MD5 hash:
963f96f1c4e417ef8d0dff8f04003db2
SHA1 hash:
556190e60686ed7166dfdbf9cd883d72622f35dd
SH256 hash:
43c4545fe9b0cb3723bc481c7786209d125ac012fda11f3a243f5fdd239d2437
MD5 hash:
bbdde020cb1aa8c82b0130020d250b0b
SHA1 hash:
284bb91341e198d42d145aa316e73fa8349d2662
SH256 hash:
e2beaf61ef8408e20b5dd05ffab6e1a62774088b3acdebd834f51d77f9824112
MD5 hash:
ce54b9287c3e4b5733035d0be085d989
SHA1 hash:
07a17e423bf89d9b056562d822a8f651aeb33c96
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
565cb30a640d5cb469f9d93c969aab083fa14dfdf983411c132927665531795c
MD5 hash:
83b531c1515044f8241cd9627fbfbe86
SHA1 hash:
d2f7096e18531abb963fc9af7ecc543641570ac8
SH256 hash:
245a869dc8a9bcb2190b5da3ea234740d79798385784e8db7aa3f2d2745192aa
MD5 hash:
4f93004835598b36011104e6f25dbdba
SHA1 hash:
6cb45092356c54f68d26f959e4a05ce80ef28483
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
56bc47d13a1d7ac385634f70075ca750b5e6455bef63152eb6ccf4276b9cefa5
MD5 hash:
86e406c290b0e202bbd56c69d9930e12
SHA1 hash:
228b209f2e930be14605dd8ad54c618643367ad1
SH256 hash:
0d3cf19f775376600ee8dc44dd3edd984bf43a21de339da32aaf60d344c5f801
MD5 hash:
95161d444154a3bb27619fc5806c8bec
SHA1 hash:
6ea1996a9c65821bf810cdc800d191ea67e2e0f7
SH256 hash:
e2331a60754583c5493112235e71cba451309d3e745ad657e7f892d154566409
MD5 hash:
84b4c53f6d70c61483892126c41a1e58
SHA1 hash:
eb264a262f23b9fa6d7c66ff3ed2db80eabaeac6
SH256 hash:
a2da5b6a3aaa8091662f3690675149bbd813affd41eb5122df722585505ddad4
MD5 hash:
3984943ba84970de9b154f38843b1c38
SHA1 hash:
36c9bece4f07325e6e9a0e2af44ab7cef15487da
SH256 hash:
6b7dba8bea5b893225f6fbf56bf546d742c58648133612cee0e26f1df3d3d4c8
MD5 hash:
eee718451c883233c3e221b32c241f74
SHA1 hash:
270987d57d5281eb531190afa4d9848d7e4bfc93
SH256 hash:
7fe8a76ebb7c60c7a435665e84c7084bf28f9962376e2de12fd9479a1dba6774
MD5 hash:
8196ab9f540374159bec7375b639a53e
SHA1 hash:
6b13b8d8344b22806e0ba870e2e3365d12879588
SH256 hash:
0e8161add1d676fd8047302871a45cbea7edbf04d174aba28289d627ac2d484e
MD5 hash:
9b6a125eb94a7eb1f249b683392527e0
SHA1 hash:
397a03748dd4ac145e5a177875251044b1147a20
SH256 hash:
5edfe3cc46cfddeb8d24131cb18c4937d95014775559a8edc661a8ee044c223d
MD5 hash:
f3233e08ac652b9375e1d59bc27e0734
SHA1 hash:
54d67575f5ca91416fbed55d9a533df3e4e4385b
SH256 hash:
f82f7ef14010b839f34c3316c345542baffccb637202df3dcce04cb8a78734fc
MD5 hash:
f486a9a003a882bf2cd434e00d2a2bc9
SHA1 hash:
794fbbb198e953dc4ba702c97cb992293b1aca5d
SH256 hash:
76eaaef9b3eb754a54eafbdb18ca6f76bdf8ea493856548a649a5a9dc8bd647b
MD5 hash:
fa3c3439813ac908e0312111e57c3761
SHA1 hash:
d5fd0140c1c1cfda50ad5157ed5dcdce4e76d3d6
SH256 hash:
8eb464ddff8d1b4844641e7e1eefdcb9cd5830a3e63d19fe0c061db6a21b4405
MD5 hash:
afb09650da6a333eca094a9153723f47
SHA1 hash:
1937bd66b1c9aeb2dd10561e8f20003d582c39a2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_OnlyLogger
Author:ditekSHen
Description:Detects OnlyLogger loader variants
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments