MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9ab30823de1456e3176373b63d29e488f055648e1f00e9befbf241c54461613f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Redosdru


Vendor detections: 16


Intelligence 16 IOCs YARA 18 File information Comments

SHA256 hash: 9ab30823de1456e3176373b63d29e488f055648e1f00e9befbf241c54461613f
SHA3-384 hash: c7e4e83d9b77da79b62ef0e932ac12abbc26f4645741f35209d91cbf8bb73232f9d1a73183fac174c1b4f5a3685d4ca0
SHA1 hash: 767318a92c4100042e0679fd9a2411941d990308
MD5 hash: d90e3564b38067cfe0a3ace5a8ba526d
humanhash: louisiana-sixteen-april-winner
File name:DhlServer.exe
Download: download sample
Signature Redosdru
File size:2'162'289 bytes
First seen:2025-05-23 07:06:03 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9165ea3e914e03bda3346f13edbd6ccd (3 x ValleyRAT, 2 x QuasarRAT, 1 x Redosdru)
ssdeep 49152:AvXJc6lhTr1qhS8R9UCHJgrGlW5zspsosvD/DX+y4onCYDoD5:V6lvqhJhSTFKlsvD/D+donCYUV
TLSH T1EBA5D050E11A802FDA7712BA4EBF711DB10DFED5130276C3A2DC6E181BBD8E5792A48D
TrID 32.2% (.EXE) Win32 EXE PECompact compressed (v2.x) (59069/9/14)
22.6% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
17.0% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
9.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
5.7% (.EXE) Win64 Executable (generic) (10522/11/4)
Magika pebin
dhash icon 72e9cca096cc70b2 (1 x Redosdru)
Reporter abuse_ch
Tags:exe Redosdru

Intelligence


File Origin
# of uploads :
1
# of downloads :
419
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DhlServer.exe
Verdict:
Malicious activity
Analysis date:
2025-05-23 07:08:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
flystudio madi
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a window
Creating a file
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Creating a file in the Windows directory
Creating a file in the Program Files subdirectories
Creating a service
Launching a service
Connection attempt
Sending a custom TCP request
Searching for synchronization primitives
DNS request
Launching the default Windows debugger (dwwin.exe)
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Enabling autorun for a service
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
adaptive-context flystudio keylogger masquerade microsoft_visual_cc overlay overlay packed packed packed packer_detected pcclient
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Redosdru
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to access PhysicalDrive, possible boot sector overwrite
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Contains functionality to register a low level keyboard hook
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Suricata IDS alerts for network traffic
Yara detected Redosdru
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1697483 Sample: DhlServer.exe Startdate: 23/05/2025 Architecture: WINDOWS Score: 100 63 fujinzhuang.f3322.net 2->63 65 bg.microsoft.map.fastly.net 2->65 83 Suricata IDS alerts for network traffic 2->83 85 Malicious sample detected (through community Yara rule) 2->85 87 Antivirus detection for dropped file 2->87 89 7 other signatures 2->89 9 DhlServer.exe 5 2->9         started        13 svchost.exe 2->13         started        15 Pibknvq.exe 2->15         started        17 7 other processes 2->17 signatures3 process4 file5 55 C:\Users\user\AppData\Local\...\shell.fne, PE32 9->55 dropped 57 C:\Users\user\AppData\Local\...\krnln.fnr, PE32 9->57 dropped 59 C:\Users\user\AppData\Local\...\DhlServer.exe, PE32 9->59 dropped 61 C:\Users\user\AppData\Local\Temp\DHLDAT.exe, PE32 9->61 dropped 91 Contains functionality to access PhysicalDrive, possible boot sector overwrite 9->91 93 Contains functionality to infect the boot sector 9->93 19 cmd.exe 1 9->19         started        21 cmd.exe 1 9->21         started        95 Changes security center settings (notifications, updates, antivirus, firewall) 13->95 23 MpCmdRun.exe 13->23         started        25 WerFault.exe 21 16 15->25         started        27 Pibknvq.exe 1 15->27         started        29 Pibknvq.exe 15->29         started        31 WerFault.exe 2 17->31         started        signatures6 process7 process8 33 DHLDAT.exe 2 19->33         started        37 conhost.exe 19->37         started        39 DhlServer.exe 3 21->39         started        41 conhost.exe 21->41         started        43 conhost.exe 23->43         started        file9 51 C:\Windows\Dbcqkgf.exe, PE32 33->51 dropped 69 Antivirus detection for dropped file 33->69 71 Multi AV Scanner detection for dropped file 33->71 73 Contains functionality to capture and log keystrokes 33->73 75 Drops executables to the windows directory (C:\Windows) and starts them 33->75 45 Dbcqkgf.exe 4 33->45         started        53 C:\Program Files (x86)\...\Pibknvq.exe, PE32 39->53 dropped 77 Detected unpacking (changes PE section rights) 39->77 79 Contains functionality to register a low level keyboard hook 39->79 81 Contains functionality to detect sleep reduction / modifications 39->81 49 Pibknvq.exe 1 39->49         started        signatures10 process11 dnsIp12 67 103.40.161.135, 49687, 9090 ANCHGLOBAL-AS-APAnchnetAsiaLimitedHK Hong Kong 45->67 97 Antivirus detection for dropped file 45->97 99 Multi AV Scanner detection for dropped file 45->99 signatures13
Threat name:
Win32.Backdoor.Farfli
Status:
Malicious
First seen:
2025-05-22 20:13:28 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
32 of 38 (84.21%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
redosdru
Similar samples:
Result
Malware family:
gh0strat
Score:
  10/10
Tags:
family:gh0strat discovery persistence rat upx
Behaviour
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Drops file in Windows directory
UPX packed file
Adds Run key to start application
Enumerates connected drives
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Gh0st RAT payload
Gh0strat
Gh0strat family
Verdict:
Malicious
Tags:
red_team_tool apt flystudio trojan Win.Packed.Deepscan-7131208-0
YARA:
S_MultiFunction_Scanners_s MAL_CN_FlyStudio_May18_1_RID2F5C MAL_CN_FlyStudio_May18_1
Unpacked files
SH256 hash:
9ab30823de1456e3176373b63d29e488f055648e1f00e9befbf241c54461613f
MD5 hash:
d90e3564b38067cfe0a3ace5a8ba526d
SHA1 hash:
767318a92c4100042e0679fd9a2411941d990308
SH256 hash:
820d8dd49baed0da44d42555ad361d78e068115661dce72ae6578dcdab6baead
MD5 hash:
97c8fe752e354b2945e4c593a87e4a8b
SHA1 hash:
03ab4c91535ecf14b13e0258f3a7be459a7957f9
SH256 hash:
1c837da39b0181122d5e8fef82ebe43540afda609f3f6085fb616f91155d8cfb
MD5 hash:
1b6a3fa139983b69f9205aabe89d6747
SHA1 hash:
ce291190a92fe5c7f0b0bdbe9829b84511e0f717
SH256 hash:
5949e1bf47f20b3d19c905788fc7b1c1e7eee2d7191c5f031d260d00d4c99ac5
MD5 hash:
5aa13dc62955da37e9131445c39d1ac0
SHA1 hash:
d54fcd22f694087687a5f0dd9c781ecd291bc16d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:dgaaga
Author:Harshit
Description:Detects suspicious PowerShell or registry activity
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_EXE_NoneWindowsUA
Author:ditekSHen
Description:Detects Windows executables referencing non-Windows User-Agents
Rule name:InstallShield2000
Author:malware-lu
Rule name:MAL_CN_FlyStudio_May18_1
Author:Florian Roth (Nextron Systems)
Description:Detects malware / hacktool detected in May 2018
Reference:Internal Research
Rule name:MAL_CN_FlyStudio_May18_1_RID2F5C
Author:Florian Roth
Description:Detects malware / hacktool detected in May 2018
Reference:Internal Research
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:PECompactv2xx
Author:malware-lu
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:S_MultiFunction_Scanners_s
Author:Florian Roth (Nextron Systems)
Description:Chinese Hacktool Set - file s.exe
Reference:http://tools.zjqhr.com/
Rule name:S_MultiFunction_Scanners_s_RID3182
Author:Florian Roth
Description:Chinese Hacktool Set - file s.exe
Reference:http://tools.zjqhr.com/
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9
Rule name:Windows_Generic_Threat_4578ee8c
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Redosdru

Executable exe 9ab30823de1456e3176373b63d29e488f055648e1f00e9befbf241c54461613f

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetCommandLineA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryA
KERNEL32.dll::CreateFileA
KERNEL32.dll::GetTempPathA

Comments