MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 aa79b859945459fd6d1363c35e68c9d2674a78f1fdee02b8ddfab9a8fa011b48. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 3 File information Comments

SHA256 hash: aa79b859945459fd6d1363c35e68c9d2674a78f1fdee02b8ddfab9a8fa011b48
SHA3-384 hash: 0276feba970e6fb169b840abf4509a1ae6c9a74ad357aeeee8dd606681c34737c2ef80b9ab66aa9c80e7e01b876e3841
SHA1 hash: 6676345eee8b504452bbd0d09031384a57e898c8
MD5 hash: 8cb16836d413b3503fdad98fe3717d2f
humanhash: green-whiskey-august-north
File name:AA79B859945459FD6D1363C35E68C9D2674A78F1FDEE0.exe
Download: download sample
Signature RedLineStealer
File size:3'546'180 bytes
First seen:2022-07-23 01:50:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xTCvLUBsgqAtzdDnuqxlivbYim/S/dL7f5aJRcjOSWS:xoLUCg7tR7noYinaJ+jNV
TLSH T144F5332073F55CB2E9077535FF41F776A0EEC25C266048CBB720D9189F3A866A13B929
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
195.2.78.242:33091

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
195.2.78.242:33091 https://threatfox.abuse.ch/ioc/839183/

Intelligence


File Origin
# of uploads :
1
# of downloads :
301
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
DNS request
Query of malicious DNS domain
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
arkeistealer barys overlay packed shell32.dll upatre
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine, SmokeLoader, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Generic Downloader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 672039 Sample: AA79B859945459FD6D1363C35E6... Startdate: 23/07/2022 Architecture: WINDOWS Score: 100 61 s.lletlee.com 2->61 63 www.bijoy52bd.com 2->63 65 22 other IPs or domains 2->65 97 Snort IDS alert for network traffic 2->97 99 Multi AV Scanner detection for domain / URL 2->99 101 Malicious sample detected (through community Yara rule) 2->101 105 12 other signatures 2->105 11 AA79B859945459FD6D1363C35E68C9D2674A78F1FDEE0.exe 15 2->11         started        signatures3 103 Performs DNS queries to domains with low reputation 61->103 process4 file5 53 C:\Users\user\AppData\...\setup_install.exe, PE32 11->53 dropped 55 C:\Users\user\AppData\...\Wed19b7cd8faf1.exe, PE32 11->55 dropped 57 C:\Users\user\...\Wed19b20bea521a2b.exe, PE32 11->57 dropped 59 10 other files (5 malicious) 11->59 dropped 14 setup_install.exe 1 11->14         started        process6 dnsIp7 69 s.lletlee.com 14->69 71 hsiens.xyz 14->71 73 127.0.0.1 unknown unknown 14->73 127 Performs DNS queries to domains with low reputation 14->127 129 Adds a directory exclusion to Windows Defender 14->129 18 cmd.exe 1 14->18         started        20 cmd.exe 14->20         started        22 cmd.exe 14->22         started        24 8 other processes 14->24 signatures8 process9 dnsIp10 28 Wed19b7cd8faf1.exe 18->28         started        31 Wed196efcc97ca6fa0.exe 20->31         started        34 Wed19265f473d3e.exe 22->34         started        67 iplis.ru 24->67 107 Adds a directory exclusion to Windows Defender 24->107 36 Wed191029a419a6.exe 12 24->36         started        38 Wed1969d72f6944afc9.exe 24->38         started        40 Wed19b20bea521a2b.exe 2 24->40         started        42 2 other processes 24->42 signatures11 process12 dnsIp13 109 Antivirus detection for dropped file 28->109 111 Multi AV Scanner detection for dropped file 28->111 113 Detected unpacking (changes PE section rights) 28->113 125 4 other signatures 28->125 44 explorer.exe 28->44 injected 83 163.123.143.12, 49797, 49805, 49833 ILIGHT-NETUS Reserved 31->83 89 6 other IPs or domains 31->89 115 May check the online IP address of the machine 31->115 117 Tries to harvest and steal browser information (history, passwords, etc) 31->117 119 Disable Windows Defender real time protection (registry) 31->119 85 w0rkinginstanc3.xyz 188.114.97.3, 443, 49790, 49808 CLOUDFLARENETUS European Union 34->85 91 2 other IPs or domains 34->91 121 Performs DNS queries to domains with low reputation 34->121 123 Machine Learning detection for dropped file 34->123 87 eduarroma.tumblr.com 74.114.154.22, 443, 49766 AUTOMATTICUS Canada 36->87 46 WerFault.exe 36->46         started        93 3 other IPs or domains 38->93 49 Wed19b20bea521a2b.exe 40->49         started        95 3 other IPs or domains 42->95 signatures14 process15 dnsIp16 75 s.lletlee.com 46->75 77 s.lletlee.com 49->77 79 live.goatgame.live 49->79 81 telegram.org 49->81 51 conhost.exe 49->51         started        process17
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2021-08-26 14:18:45 UTC
File Type:
PE (Exe)
Extracted files:
224
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:privateloader family:vidar botnet:706 aspackv2 evasion loader main persistence spyware stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Enumerates connected drives
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Installed Components in the registry
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
PrivateLoader
Vidar
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
Malware Config
C2 Extraction:
http://37.0.10.214/proxies.txt
http://37.0.10.244/server.txt
http://wfsdragon.ru/api/setStats.php
37.0.10.237
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
https://eduarroma.tumblr.com/
Unpacked files
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
Detections:
win_vidar_auto
SH256 hash:
9c0ef67f53069b6c536d0a48d39021659849e6030009596eb252644d34c22ba6
MD5 hash:
ebab03847265e12c3223b66f16bf64da
SHA1 hash:
305c56392dc460363673c9234c4e0fb3ee977617
SH256 hash:
b3b6df5968e11b89a4132b732f4f756a7e29d20e211db8cfbb873e36ccf71bb8
MD5 hash:
f2f7c988fc4a918a1e2ef2631700c7f3
SHA1 hash:
183e303ad3f7aba9d8d806f220548a472998ce49
SH256 hash:
a62e66255f1d647de0fb7fb0f06a2d6abed2af113658be7fe19784834c0a3236
MD5 hash:
b3da7b927138d84f8bbf8d0da66a0cdb
SHA1 hash:
efb2c0bbbd47f4265c50946577976fedb92a3164
Detections:
win_privateloader_a0
SH256 hash:
d485f75becb68a833906761f75b8b9072eac046929a7fe2d14360ccf6d2a4558
MD5 hash:
7c3b4386fb2183105068ae22613ebf5b
SHA1 hash:
ed8d947b0232fb9171805cc700c73a6cb35702b2
SH256 hash:
37811fe51b5b078678276961e401d5291b495ba0ddef4de48d4727a877cca9ea
MD5 hash:
840cd7335492baad8db84b3210d00280
SHA1 hash:
c3a06626a73b17602a95cc891463d6de2ac99571
SH256 hash:
88a1da34354279e18e10c7dd4361d7174f45c243f6a0d3321036127939cd7642
MD5 hash:
dcde2f9b24961954196f6e044994cdb6
SHA1 hash:
b8b5df5cd2a6945fd33257812cda157e0d912eca
SH256 hash:
6644cc30bbfca5eb2cc54cb3d0579c2d7ce154152032c465c5a9008725386432
MD5 hash:
f7f2d6b48ced5329edfbe14ed8de0536
SHA1 hash:
21a1912007c06a038b2d60c355b37ac81db217ba
SH256 hash:
6af917f66b6fe4205668d9570932104f2befea2c2c021c61a321844b69e8ce67
MD5 hash:
e4247a59385c2a402176d807cbbb8298
SHA1 hash:
2982a6cb5ab21179833c5e431dc5ef4fa0984147
SH256 hash:
ba97450916af084badf30cd9aaf1a4a9a5caff85539650b10b8c6691f83777f8
MD5 hash:
724c977b698060c4bc440daa441183a4
SHA1 hash:
54497deaa978842a1ba8d016b993aaf056b9476e
Detections:
win_privateloader_a0
SH256 hash:
e80da02d88b631ad5080d5b1a8097310b7dbf0a16a709e0142d3667352d1648b
MD5 hash:
34061b7c12983244a908b7f71841c349
SHA1 hash:
828380cd340413133a79649c681ed405fc85a33d
SH256 hash:
aa79b859945459fd6d1363c35e68c9d2674a78f1fdee02b8ddfab9a8fa011b48
MD5 hash:
8cb16836d413b3503fdad98fe3717d2f
SHA1 hash:
6676345eee8b504452bbd0d09031384a57e898c8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments