MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b77f93f049dc0d81f537d1c29356aba270386abcf5cfe43b9c32e52035a9c59b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 3 File information Comments

SHA256 hash: b77f93f049dc0d81f537d1c29356aba270386abcf5cfe43b9c32e52035a9c59b
SHA3-384 hash: 6e795ea74d8b1437b8c26e3446a775d46466bdc1009bdb93e9d53b55c79dc0533f1217001dbaa8e364da3ea740080f27
SHA1 hash: 17cda101a2bdca6e36fde7a6b0e982b4ba466a9d
MD5 hash: b2f98b6422d86ccbd4f0aaa747741707
humanhash: potato-butter-lithium-oven
File name:b2f98b6422d86ccbd4f0aaa747741707.exe
Download: download sample
Signature RedLineStealer
File size:242'125 bytes
First seen:2021-12-20 12:26:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 44c00401a20ce3d35e55418765dd0985 (4 x RedLineStealer, 2 x DanaBot)
ssdeep 6144:bKYjcJT5W7vx0HTuzbgwuPBcnU3JAEwVwUrTP:bKYcJ01cunnUvZAE2r7
Threatray 6'134 similar samples on MalwareBazaar
TLSH T11634D03175DCC7FAE1A30A7035686B80DAF6F83C126E418B6755021A6F2DE8C57E621F
File icon (PE):PE icon
dhash icon 4839b234e8c38890 (121 x RaccoonStealer, 54 x RedLineStealer, 51 x ArkeiStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
62.182.156.187:56323

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
62.182.156.187:56323 https://threatfox.abuse.ch/ioc/277871/

Intelligence


File Origin
# of uploads :
1
# of downloads :
151
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Launching a process
Creating a process with a hidden window
Creating a file in the %temp% directory
Creating a service
Launching a service
Loading a system driver
Creating a window
Searching for the window
DNS request
Enabling autorun for a service
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
GetTempPath
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
75%
Tags:
azorult floxif greyware obfuscated overlay packed virus
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
spre.troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected VMProtect packer
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs a network lookup / discovery via ARP
Sample is not signed and drops a device driver
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 542726 Sample: Co0aRUVcKE.exe Startdate: 20/12/2021 Architecture: WINDOWS Score: 100 75 host-data-coin-11.com 2->75 77 file-file-host4.com 2->77 79 11 other IPs or domains 2->79 99 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->99 101 Multi AV Scanner detection for domain / URL 2->101 103 Found malware configuration 2->103 105 13 other signatures 2->105 8 Co0aRUVcKE.exe 2 2->8         started        12 jwsjigs 2->12         started        14 svchost.exe 2->14         started        16 10 other processes 2->16 signatures3 process4 file5 59 C:\Program Files\Common Files\...\symsrv.dll, PE32 8->59 dropped 107 Contains functionality to inject code into remote processes 8->107 109 Injects a PE file into a foreign processes 8->109 111 Performs a network lookup / discovery via ARP 8->111 18 Co0aRUVcKE.exe 8->18         started        21 ARP.EXE 1 8->21         started        24 ARP.EXE 1 8->24         started        30 16 other processes 8->30 61 C:\...\oFeNxHbtGnlTXDFsTUwVuYCDmhuKP.exe.tmp, PE32 12->61 dropped 63 C:\Users\user\AppData\Local\Temp\smrtx.sys, PE32 12->63 dropped 65 C:\Users\user\AppData\Local\Temp\kocfg.sys, PE32 12->65 dropped 67 oFeNxHbtGnlTXDFsTUwVuYCDmhuKP.exe (copy), PE32 12->67 dropped 113 Antivirus detection for dropped file 12->113 115 Machine Learning detection for dropped file 12->115 117 Sample is not signed and drops a device driver 12->117 26 jwsjigs 12->26         started        119 Changes security center settings (notifications, updates, antivirus, firewall) 14->119 28 MpCmdRun.exe 14->28         started        signatures6 process7 dnsIp8 83 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 18->83 85 Maps a DLL or memory area into another process 18->85 87 Checks if the current machine is a virtual machine (disk enumeration) 18->87 32 explorer.exe 18->32 injected 81 192.168.2.1 unknown unknown 21->81 37 conhost.exe 21->37         started        39 conhost.exe 24->39         started        89 Creates a thread in another existing process (thread injection) 26->89 41 conhost.exe 28->41         started        43 conhost.exe 30->43         started        45 conhost.exe 30->45         started        47 conhost.exe 30->47         started        49 12 other processes 30->49 signatures9 process10 dnsIp11 69 185.233.81.115, 443, 49812 SUPERSERVERSDATACENTERRU Russian Federation 32->69 71 unicupload.top 54.38.220.85, 49822, 80 OVHFR France 32->71 73 11 other IPs or domains 32->73 51 C:\Users\user\AppData\Roaming\jwsjigs, PE32 32->51 dropped 53 C:\Users\user\AppData\Local\Temp\F93A.exe, PE32 32->53 dropped 55 C:\Users\user\AppData\Local\TempC1A.exe, PE32 32->55 dropped 57 8 other malicious files 32->57 dropped 91 System process connects to network (likely due to code injection or exploit) 32->91 93 Benign windows process drops PE files 32->93 95 Deletes itself after installation 32->95 97 Hides that the sample has been downloaded from the Internet (zone.identifier) 32->97 file12 signatures13
Threat name:
Win32.Virus.Floxif
Status:
Malicious
First seen:
2021-12-18 12:29:00 UTC
File Type:
PE (Exe)
Extracted files:
22
AV detection:
42 of 43 (97.67%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:arkei family:redline family:smokeloader family:tofsee family:xmrig botnet:1 botnet:install backdoor collection discovery evasion infostealer miner persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates system info in registry
GoLang User-Agent
Kills process with taskkill
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Enumerates connected drives
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
UPX packed file
VMProtect packed file
ACProtect 1.3x - 1.4x DLL software
Arkei Stealer Payload
XMRig Miner Payload
Amadey
Arkei
RedLine
RedLine Payload
SmokeLoader
Tofsee
Windows security bypass
xmrig
Malware Config
C2 Extraction:
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
mubrikych.top
oxxyfix.xyz
86.107.197.138:38133
185.215.113.35/d2VxjasuwS/index.php
62.182.156.187:56323
Unpacked files
SH256 hash:
2ea99c4c2976b9f9dcf6f5ef8becd668938f87f30b2adfb385b8f5751730385b
MD5 hash:
bd3fe80cda13959c9c42e58004a0b48f
SHA1 hash:
c3758693c36116804270ce5b936089114756240f
SH256 hash:
b77f93f049dc0d81f537d1c29356aba270386abcf5cfe43b9c32e52035a9c59b
MD5 hash:
b2f98b6422d86ccbd4f0aaa747741707
SHA1 hash:
17cda101a2bdca6e36fde7a6b0e982b4ba466a9d
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Malware_Floxif_mpsvc_dll
Author:Florian Roth
Description:Malware - Floxif
Reference:Internal Research
Rule name:Malware_Floxif_mpsvc_dll_RID30C4
Author:Florian Roth
Description:Malware - Floxif
Reference:Internal Research
Rule name:MALWARE_Win_FloodFix
Author:ditekSHen
Description:Detects FloodFix

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments