MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 af350212764e6304bf417e81cf0009b494119670e4bc1b187cd79cf4c487c7b6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: af350212764e6304bf417e81cf0009b494119670e4bc1b187cd79cf4c487c7b6
SHA3-384 hash: c3309b3877b20b31d59db57e5a44f485300dc3d4c5921d534ddbd7658ccf2647781c293dd370cee020f757c323c2e807
SHA1 hash: 0f6c4618eb4fca4972869a56bf6d8b020e1440f8
MD5 hash: 3568d61a49b61ce18bd6093748ffd32a
humanhash: stream-kitten-east-washington
File name:3568d61a49b61ce18bd6093748ffd32a.exe
Download: download sample
Signature RedLineStealer
File size:798'208 bytes
First seen:2021-06-23 20:21:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 146d9834dca937c5740063d6c887d411 (2 x DiamondFox, 1 x RedLineStealer)
ssdeep 12288:VoyNaVHKFOOVEWqRZHxv+OeO+OeNhBBhhBBX3rjISihqxk3tkw30cHTnQdncOVE4:VoIalKcf30mhJ9TnJNLTF8fmNLa
Threatray 918 similar samples on MalwareBazaar
TLSH B7058D20B182E1B1E4A100F5296CBFA6146D7C3407748AEBF3D87F6D5A3D5C15E32A9B
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
95.181.179.72:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
95.181.179.72:80 https://threatfox.abuse.ch/ioc/152897/

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
x86_x64_setup.exe
Verdict:
Malicious activity
Analysis date:
2021-06-22 23:28:51 UTC
Tags:
evasion trojan stealer vidar rat redline ficker phishing autoit

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
May modify the system service descriptor table (often done to hook functions)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Glupteba
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 439281 Sample: yevbZfdCqR.exe Startdate: 23/06/2021 Architecture: WINDOWS Score: 100 88 email.yg9.me 2->88 118 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->118 120 Multi AV Scanner detection for domain / URL 2->120 122 Found malware configuration 2->122 124 19 other signatures 2->124 9 yevbZfdCqR.exe 4 49 2->9         started        14 svchost.exe 2->14         started        16 explorer.exe 2->16         started        signatures3 process4 dnsIp5 100 jom.diregame.live 9->100 102 136.144.41.152, 49735, 80 WORLDSTREAMNL Netherlands 9->102 104 10 other IPs or domains 9->104 72 C:\Users\...\ulVElw2mPS2j3QKCM9gOxM3j.exe, PE32 9->72 dropped 74 C:\Users\...\oO2a8x5RXTHKygCXkT7syx3J.exe, PE32 9->74 dropped 76 C:\Users\...\gUlDp5No64Xfcgfbo3IlvG0y.exe, PE32 9->76 dropped 78 27 other files (12 malicious) 9->78 dropped 142 Drops PE files to the document folder of the user 9->142 144 Creates HTML files with .exe extension (expired dropper behavior) 9->144 146 Performs DNS queries to domains with low reputation 9->146 148 Disable Windows Defender real time protection (registry) 9->148 18 gDoWsyv4ZlqhjBKjyfkjR1BY.exe 9->18         started        21 M5uLwz0sXvZcR89u_43Nm9v8.exe 9->21         started        23 ZteJ0k9a2sM9jXcC3SndaipD.exe 86 9->23         started        27 12 other processes 9->27 150 Sets debug register (to hijack the execution of another thread) 14->150 152 Modifies the context of a thread in another process (thread injection) 14->152 file6 signatures7 process8 dnsIp9 54 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 18->54 dropped 56 C:\Users\user\AppData\Local\...\System.dll, PE32 18->56 dropped 64 131 other files (none is malicious) 18->64 dropped 58 C:\Program Files (x86)\...\md8_8eus.exe, PE32 21->58 dropped 60 C:\Program Files (x86)\Company\...\jooyu.exe, PE32 21->60 dropped 62 C:\Program Files (x86)\...\jingzhang.exe, PE32 21->62 dropped 66 2 other files (1 malicious) 21->66 dropped 29 md8_8eus.exe 21->29         started        34 jooyu.exe 21->34         started        36 jingzhang.exe 21->36         started        38 file4.exe 21->38         started        90 159.69.20.131 HETZNER-ASDE Germany 23->90 92 sergeevih43.tumblr.com 74.114.154.22 AUTOMATTICUS Canada 23->92 68 6 other files (none is malicious) 23->68 dropped 126 Detected unpacking (changes PE section rights) 23->126 128 Detected unpacking (overwrites its own PE header) 23->128 130 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->130 132 Tries to steal Crypto Currency Wallets 23->132 94 g-partners.top 138.68.187.227 DIGITALOCEAN-ASNUS United States 27->94 96 g-partners.in 27->96 98 5 other IPs or domains 27->98 70 15 other files (none is malicious) 27->70 dropped 134 DLL reload attack detected 27->134 136 May check the online IP address of the machine 27->136 138 Tries to harvest and steal browser information (history, passwords, etc) 27->138 140 Injects a PE file into a foreign processes 27->140 40 MQ5u6_H0cs9EUXsesfNpGUNc.exe 27->40         started        42 rundll32.exe 27->42         started        44 Browzar.exe 27->44         started        46 6 other processes 27->46 file10 signatures11 process12 dnsIp13 106 101.36.107.74 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 29->106 108 iplogger.org 29->108 80 C:\Users\user\Documents\...\md8_8eus.exe, PE32 29->80 dropped 154 Tries to harvest and steal browser information (history, passwords, etc) 29->154 110 www.facebook.com 34->110 112 star-mini.c10r.facebook.com 34->112 114 ip-api.com 34->114 48 jfiag3g_gg.exe 34->48         started        50 jfiag3g_gg.exe 34->50         started        82 C:\Users\user\AppData\Local\...\install.dll, PE32 36->82 dropped 84 C:\Users\user\AppData\...84ewtonsoft.Json.dll, PE32 36->84 dropped 52 conhost.exe 36->52         started        86 C:\Users\user\AppData\Local\Temp\AE30.tmp, PE32 40->86 dropped 156 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 40->156 158 Renames NTDLL to bypass HIPS 40->158 160 Checks if the current machine is a virtual machine (disk enumeration) 40->160 162 Writes to foreign memory regions 42->162 164 Allocates memory in foreign processes 42->164 116 www.browzar.com 139.59.176.201 DIGITALOCEAN-ASNUS Singapore 44->116 file14 signatures15 process16
Threat name:
Win32.Trojan.Bsymem
Status:
Malicious
First seen:
2021-06-18 14:54:01 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:metasploit family:plugx family:redline family:smokeloader family:vidar botnet:ecw3fqngfwidkzfi botnet:gxq3gyi1svg= botnet:test backdoor discovery dropper evasion infostealer loader spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
Vidar Stealer
Glupteba
Glupteba Payload
MetaSploit
Modifies Windows Defender Real-time Protection settings
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
DDkKBA0ZQRA9DTQUNixBQAA8OlgtKC5J
qurigoraka.xyz:80
JTNAHDgsJQIaczIMIA8cWhcTLlA4LVxJ
http://999080321newfolder1002002131-service1002.space/
http://999080321newfolder1002002231-service1002.space/
http://999080321newfolder3100231-service1002.space/
http://999080321newfolder1002002431-service1002.space/
http://999080321newfolder1002002531-service1002.space/
http://999080321newfolder33417-012425999080321.space/
http://999080321test125831-service10020125999080321.space/
http://999080321test136831-service10020125999080321.space/
http://999080321test147831-service10020125999080321.space/
http://999080321test146831-service10020125999080321.space/
http://999080321test134831-service10020125999080321.space/
http://999080321est213531-service1002012425999080321.ru/
http://999080321yes1t3481-service10020125999080321.ru/
http://999080321test13561-service10020125999080321.su/
http://999080321test14781-service10020125999080321.info/
http://999080321test13461-service10020125999080321.net/
http://999080321test15671-service10020125999080321.tech/
http://999080321test12671-service10020125999080321.online/
http://999080321utest1341-service10020125999080321.ru/
http://999080321uest71-service100201dom25999080321.ru/
http://999080321test61-service10020125999080321.website/
http://999080321test51-service10020125999080321.xyz/
http://999080321test41-service100201pro25999080321.ru/
http://999080321yest31-service100201rus25999080321.ru/
http://999080321rest21-service10020125999080321.eu/
http://999080321test11-service10020125999080321.press/
http://999080321newfolder4561-service10020125999080321.ru/
http://999080321rustest213-service10020125999080321.ru/
http://999080321test281-service10020125999080321.ru/
http://999080321test261-service10020125999080321.space/
http://999080321yomtest251-service10020125999080321.ru/
http://999080321yirtest231-service10020125999080321.ru/
Unpacked files
SH256 hash:
af350212764e6304bf417e81cf0009b494119670e4bc1b187cd79cf4c487c7b6
MD5 hash:
3568d61a49b61ce18bd6093748ffd32a
SHA1 hash:
0f6c4618eb4fca4972869a56bf6d8b020e1440f8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments