MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ab479d019576efd4dd391e0bf3fc1bedb10367e1ece7157d609a283873a43645. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 2 YARA 9 File information Comments

SHA256 hash: ab479d019576efd4dd391e0bf3fc1bedb10367e1ece7157d609a283873a43645
SHA3-384 hash: 227aed4f2618563d695db8530b0c6f5a44ee4c604cf0d8af5a8fe596613ca548bdd9032b5850b74c401ac9527c0a2c2c
SHA1 hash: 2aad87da256f1b26c40e1243f4ec7ea15c2f4690
MD5 hash: b81a72714c586f9b634b059b73da8a3a
humanhash: oscar-arizona-grey-foxtrot
File name:AB479D019576EFD4DD391E0BF3FC1BEDB10367E1ECE71.exe
Download: download sample
Signature RedLineStealer
File size:2'770'830 bytes
First seen:2022-08-06 13:40:26 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 49152:EgFjthIMr7mv/vjhM5oEKe6X640BBjhqSjOsZ/RGiNZ4z:JFtXHmvTS5WbKtqSjOM/RGi/C
TLSH T136D53324DBA569ABDC0BD3738B30663D6599BE0604318AA7374984783D6F0F2B91D373
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
194.36.177.7:39556

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
194.36.177.7:39556 https://threatfox.abuse.ch/ioc/841642/
65.108.231.254:29517 https://threatfox.abuse.ch/ioc/841643/

Intelligence


File Origin
# of uploads :
1
# of downloads :
344
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
AB479D019576EFD4DD391E0BF3FC1BEDB10367E1ECE71.exe
Verdict:
No threats detected
Analysis date:
2022-08-06 13:41:11 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Moving a recently created file
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Launching a process
Creating a window
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
80%
Tags:
azorult barys overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nitol, RedLine, SmokeLoader, Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Nitol
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 679780 Sample: AB479D019576EFD4DD391E0BF3F... Startdate: 06/08/2022 Architecture: WINDOWS Score: 100 112 stratum-eu.rplant.xyz 2->112 114 s.lletlee.com 2->114 116 10 other IPs or domains 2->116 164 Snort IDS alert for network traffic 2->164 166 Multi AV Scanner detection for domain / URL 2->166 168 Malicious sample detected (through community Yara rule) 2->168 170 20 other signatures 2->170 12 AB479D019576EFD4DD391E0BF3FC1BEDB10367E1ECE71.exe 10 2->12         started        15 rundll32.exe 2->15         started        17 svchost.exe 2->17         started        20 9 other processes 2->20 signatures3 process4 file5 110 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->110 dropped 22 setup_installer.exe 15 12->22         started        25 sahiba_7.exe 12->25         started        28 rundll32.exe 15->28         started        148 Query firmware table information (likely to detect VMs) 17->148 150 Changes security center settings (notifications, updates, antivirus, firewall) 20->150 signatures6 process7 dnsIp8 86 C:\Users\user\AppData\...\setup_install.exe, PE32 22->86 dropped 88 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32+ 22->88 dropped 90 C:\Users\user\AppData\Local\...\sahiba_6.txt, PE32 22->90 dropped 92 10 other files (6 malicious) 22->92 dropped 31 setup_install.exe 1 22->31         started        138 telanganadigital.com 25->138 140 s.lletlee.com 25->140 142 3 other IPs or domains 25->142 196 Writes to foreign memory regions 28->196 198 Allocates memory in foreign processes 28->198 200 Creates a thread in another existing process (thread injection) 28->200 36 svchost.exe 28->36 injected 38 svchost.exe 28->38 injected 40 svchost.exe 28->40 injected 42 6 other processes 28->42 file9 signatures10 process11 dnsIp12 144 razino.xyz 31->144 146 127.0.0.1 unknown unknown 31->146 78 C:\Users\user\AppData\...\sahiba_6.exe (copy), PE32 31->78 dropped 80 C:\Users\user\AppData\...\sahiba_5.exe (copy), PE32 31->80 dropped 82 C:\Users\user\AppData\...\sahiba_3.exe (copy), PE32 31->82 dropped 84 4 other files (2 malicious) 31->84 dropped 152 Antivirus detection for dropped file 31->152 154 Performs DNS queries to domains with low reputation 31->154 156 Machine Learning detection for dropped file 31->156 44 cmd.exe 31->44         started        46 cmd.exe 1 31->46         started        48 cmd.exe 1 31->48         started        54 6 other processes 31->54 158 System process connects to network (likely due to code injection or exploit) 36->158 160 Sets debug register (to hijack the execution of another thread) 36->160 162 Modifies the context of a thread in another process (thread injection) 36->162 50 svchost.exe 36->50         started        file13 signatures14 process15 dnsIp16 56 sahiba_6.exe 44->56         started        61 sahiba_2.exe 1 46->61         started        63 sahiba_3.exe 45 48->63         started        118 s.lletlee.com 50->118 120 google.vrthcobj.com 50->120 172 Query firmware table information (likely to detect VMs) 50->172 122 s.lletlee.com 54->122 65 sahiba_5.exe 54->65         started        67 sahiba_1.exe 2 54->67         started        69 sahiba_4.exe 2 54->69         started        signatures17 process18 dnsIp19 124 212.193.30.115, 49777, 80 SPD-NETTR Russian Federation 56->124 126 wfsdragon.ru 172.67.133.215, 49776, 80 CLOUDFLARENETUS United States 56->126 132 9 other IPs or domains 56->132 94 C:\Users\...\w1ZiQsHvSBOdMQdF2ccMtRot.exe, PE32 56->94 dropped 96 C:\Users\...\pHA4ZhtwSaJFS9pnplDGNFkh.exe, PE32 56->96 dropped 98 C:\Users\...\p6u0_cR2oN1s4pJ15y91TyUP.exe, PE32 56->98 dropped 102 15 other files (12 malicious) 56->102 dropped 174 Drops PE files to the document folder of the user 56->174 176 May check the online IP address of the machine 56->176 178 Tries to harvest and steal browser information (history, passwords, etc) 56->178 180 Disable Windows Defender real time protection (registry) 56->180 100 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 61->100 dropped 182 DLL reload attack detected 61->182 184 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 61->184 186 Renames NTDLL to bypass HIPS 61->186 194 3 other signatures 61->194 71 explorer.exe 61->71 injected 134 2 other IPs or domains 63->134 188 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 63->188 128 music-s.xyz 99.83.154.118, 443, 49779 AMAZON-02US United States 65->128 190 Performs DNS queries to domains with low reputation 65->190 192 Creates processes via WMI 67->192 73 sahiba_1.exe 67->73         started        130 s.lletlee.com 69->130 136 2 other IPs or domains 69->136 file20 signatures21 process22 file23 104 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 73->104 dropped 106 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 73->106 dropped 108 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 73->108 dropped 76 conhost.exe 73->76         started        process24
Threat name:
Win32.Downloader.ShortLoader
Status:
Malicious
First seen:
2021-07-21 18:52:47 UTC
File Type:
PE (Exe)
Extracted files:
207
AV detection:
23 of 26 (88.46%)
Threat level:
  3/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:privateloader family:redline family:vidar botnet:933 botnet:install botnet:ruzki aspackv2 evasion infostealer loader persistence spyware stealer themida trojan upx
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
PrivateLoader
Process spawned unexpected child process
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
193.106.191.165:39482
31.41.244.109:3590
https://shpak125.tumblr.com/
Unpacked files
SH256 hash:
bc797b71d8c3cd39865a4e789ec1707d7387b785a05c0b9159f0de8b6160982e
MD5 hash:
1ee65e3ccaefc0e8cb1a84257f74d1ba
SHA1 hash:
ca0655f1b96cde8dae220a61aea643ad91f9ba30
SH256 hash:
e27c4b45b60d39cc2c66ca3e5fe2c095e8fc6bc6fcdeac26758f3cbb5f604821
MD5 hash:
bab311e39c6dc75106c93e7d9571d7f1
SHA1 hash:
d6fb876a06eb79281c21df7894fd957747c7c83b
SH256 hash:
dd5ac4469562c4d32e10983c14285e3c33849267cbf4c198d0427b21c56c49b2
MD5 hash:
aa76e329fd4fc560c0f8f6b2f224d3da
SHA1 hash:
bbbd3c4843bed7d90d7d3c5ce62c6e47639f8a14
SH256 hash:
c74894fe98864ade516c9e54f2258a23ed451feadfa2de53a7c626385b549b22
MD5 hash:
e44b6cb9e7111de178fbabf3ac1cba76
SHA1 hash:
b15d8d52864a548c42a331a574828824a65763ff
Detections:
win_privateloader_a0 win_privateloader_w0
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
1371046b187faec8708e3732fc760515a7b96236c62094598340b1dc6331ac05
MD5 hash:
1cc35bf07b551ce45921ae41602ec87d
SHA1 hash:
5eca79da173ad9912d669d85133561501976c12c
SH256 hash:
17353e7514997fb0dd0e5f93aa34950ba17c26f650b38cbaf0c83cc093de941a
MD5 hash:
6535e592ad1f85965569a8a19a45d842
SHA1 hash:
45fec86cc8bf1b64425d8ad4c1d12f16e8306bfd
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
8778bca27b96378c0d93179aa113bd40056d3595a8500b7163666be7eab12ec8
MD5 hash:
ae2a362a3fc459a2b55546080d32f376
SHA1 hash:
030b7f1eccee9d16fd03257db7d590dca92cf0d7
SH256 hash:
ab479d019576efd4dd391e0bf3fc1bedb10367e1ece7157d609a283873a43645
MD5 hash:
b81a72714c586f9b634b059b73da8a3a
SHA1 hash:
2aad87da256f1b26c40e1243f4ec7ea15c2f4690
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:RedOctoberPluginCollectInfo
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.vidar.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments