MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 95930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Arechclient2


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 95930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a
SHA3-384 hash: 65338954b0409495972a5d6a0d5d354fec5aaeec5db6217598d68f738be8dd25bb2b8f6f8f8b4d456d6cbb8bbef0768d
SHA1 hash: 24c6d4aa5f5b229340aba780320efc02058c059c
MD5 hash: 74c5934b5ec8a8907aff69552dbaeaf7
humanhash: autumn-video-yellow-avocado
File name:PfOHmro.exe
Download: download sample
Signature Arechclient2
File size:109'568 bytes
First seen:2025-03-08 15:03:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 3072:33G7HKdP1A5gx9cMtjP1JnmJJhjUHYOyV:EKdtWW9cMTJnmJJhozyV
TLSH T13BB31237EE820FFAD5394371EA8716595AF0F3010E4DAEBC548E7AB6C8A49580213F64
TrID 66.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.5% (.EXE) Win64 Executable (generic) (10522/11/4)
5.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.0% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
Reporter aachum
Tags:Arechclient2 exe RedLineStealer


Avatar
iamaachum
http://176.113.115.7/files/6386900832/PfOHmro.exe

RedLine C2: 101.99.92.190:40919
RedLine Botnet: BUILD 7

Intelligence


File Origin
# of uploads :
1
# of downloads :
469
Origin country :
ES ES
Vendor Threat Intelligence
Verdict:
Malicious
Score:
91.7%
Tags:
redline micro hype
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Unauthorized injection to a recently created process
Restart of the analyzed sample
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Сreating synchronization primitives
Connection attempt
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
MicroClip, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Drops PE files to the user root directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suricata IDS alerts for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected MicroClip
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632656 Sample: PfOHmro.exe Startdate: 08/03/2025 Architecture: WINDOWS Score: 100 95 api.ip.sb.cdn.cloudflare.net 2->95 97 api.ip.sb 2->97 103 Suricata IDS alerts for network traffic 2->103 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 109 8 other signatures 2->109 12 PfOHmro.exe 2->12         started        15 EdgeBHO.exe 2->15         started        18 EdgeBHO.exe 2->18         started        signatures3 process4 file5 123 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->123 125 Found many strings related to Crypto-Wallets (likely being stolen) 12->125 127 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->127 129 2 other signatures 12->129 20 PfOHmro.exe 15 52 12->20         started        25 WerFault.exe 21 16 12->25         started        27 PfOHmro.exe 12->27         started        29 PfOHmro.exe 12->29         started        79 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 15->79 dropped 81 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 15->81 dropped 83 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 15->83 dropped 91 50 other malicious files 15->91 dropped 31 EdgeBHO.exe 15->31         started        85 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 18->85 dropped 87 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 18->87 dropped 89 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 18->89 dropped 93 50 other malicious files 18->93 dropped 33 EdgeBHO.exe 18->33         started        signatures6 process7 dnsIp8 99 101.99.92.190, 40919, 4449, 49717 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 20->99 101 api.ip.sb.cdn.cloudflare.net 104.26.12.31, 443, 49724 CLOUDFLARENETUS United States 20->101 63 C:\Users\user\AppData\Local\...dgeBHO.exe, PE32+ 20->63 dropped 65 C:\Users\user\AppData\...\PfOHmro.exe.log, ASCII 20->65 dropped 117 Found many strings related to Crypto-Wallets (likely being stolen) 20->117 119 Tries to harvest and steal browser information (history, passwords, etc) 20->119 121 Tries to steal Crypto Currency Wallets 20->121 35 EdgeBHO.exe 55 20->35         started        39 conhost.exe 20->39         started        67 C:\ProgramData\Microsoft\...\Report.wer, Unicode 25->67 dropped file9 signatures10 process11 file12 55 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 35->55 dropped 57 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 35->57 dropped 59 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 35->59 dropped 61 50 other malicious files 35->61 dropped 111 Antivirus detection for dropped file 35->111 113 Multi AV Scanner detection for dropped file 35->113 115 Drops PE files to the user root directory 35->115 41 EdgeBHO.exe 2 35->41         started        signatures13 process14 file15 69 C:\Users\userdgeBHO.exe, PE32+ 41->69 dropped 44 cmd.exe 1 41->44         started        process16 process17 46 EdgeBHO.exe 55 44->46         started        49 taskkill.exe 1 44->49         started        51 conhost.exe 44->51         started        file18 71 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 46->71 dropped 73 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 46->73 dropped 75 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 46->75 dropped 77 50 other malicious files 46->77 dropped 53 EdgeBHO.exe 1 46->53         started        process19
Threat name:
Win32.Trojan.LummaStealer
Status:
Malicious
First seen:
2025-03-08 06:35:29 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
redlinestealer
Similar samples:
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:redline family:sectoprat botnet:build 7 discovery infostealer persistence pyinstaller rat spyware stealer trojan upx
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Detects Pyinstaller
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
RedLine
RedLine payload
Redline family
SectopRAT
SectopRAT payload
Sectoprat family
Malware Config
C2 Extraction:
101.99.92.190:40919
Verdict:
Malicious
Tags:
Win.Packed.Msilzilla-10042543-0 redline
YARA:
n/a
Unpacked files
SH256 hash:
95930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a
MD5 hash:
74c5934b5ec8a8907aff69552dbaeaf7
SHA1 hash:
24c6d4aa5f5b229340aba780320efc02058c059c
SH256 hash:
be270539be9a08a87c36ec6ac24081217213afc13438ebc7256689fea4b3a194
MD5 hash:
954b714fe2ef6b778751e99e40f6f1b7
SHA1 hash:
70ac32f04becc34a0345abd4affb22d1f55d768b
Detections:
RedLine_a INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs MALWARE_Win_RedLine
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Arechclient2

Executable exe 95930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a

(this sample)

  
Dropped by
Amadey
  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high

Comments