MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b88f56ff0f7a32d91fe1ab6f6a2920312f1b49f7cf2c2476d5e88458b0f63e6d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: b88f56ff0f7a32d91fe1ab6f6a2920312f1b49f7cf2c2476d5e88458b0f63e6d
SHA3-384 hash: 5b24ef074e0e4db3c8cb337cdbd493fd8c6cae9d034dec4709254348a30b105daa9d6c044dbb56ebba45615c6ef63b89
SHA1 hash: 0c29ac0aa7872bf8f3d974f64abc50ce18f5d214
MD5 hash: 819fa574fc96e4da7b0212e5c77d04fe
humanhash: ack-item-eight-white
File name:819fa574fc96e4da7b0212e5c77d04fe.exe
Download: download sample
Signature RedLineStealer
File size:266'752 bytes
First seen:2022-10-29 16:20:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 34c3f0ca6655048a53619f27618d4b1c (5 x Smoke Loader, 4 x Tofsee, 1 x RecordBreaker)
ssdeep 3072:yHxo+B5c5LQIvo3xV5XOaj8KCkOf3vCiHhYdU3uBNen6fGWCpE9+jtH0Zz6/M/h3:n+Be5LQioxBnCkOS8RIPv+jtHL/
TLSH T18844BE2075D0C472C7825D305926DFA0663FFC326D698A43F6942B9EBE322C1A6B535F
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 480c1c4c4f590b14 (113 x Smoke Loader, 92 x RedLineStealer, 83 x Amadey)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://95.216.181.10/

Intelligence


File Origin
# of uploads :
1
# of downloads :
568
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
819fa574fc96e4da7b0212e5c77d04fe.exe
Verdict:
No threats detected
Analysis date:
2022-10-29 16:23:19 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for synchronization primitives
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Connecting to a non-recommended domain
Reading critical registry keys
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Amadey, CryptOne, Djvu, RedLine, SmokeLo
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected CryptOne packer
Yara detected Djvu Ransomware
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 733633 Sample: 4oCbcU4npD.exe Startdate: 29/10/2022 Architecture: WINDOWS Score: 100 66 na.luckpool.net 2->66 76 Snort IDS alert for network traffic 2->76 78 Malicious sample detected (through community Yara rule) 2->78 80 Antivirus detection for URL or domain 2->80 82 13 other signatures 2->82 10 4oCbcU4npD.exe 2->10         started        13 swtwrii 2->13         started        15 cdtwrii 2->15         started        signatures3 process4 signatures5 118 Detected unpacking (changes PE section rights) 10->118 120 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 10->120 122 Maps a DLL or memory area into another process 10->122 128 2 other signatures 10->128 17 explorer.exe 23 10->17 injected 124 Multi AV Scanner detection for dropped file 13->124 126 Machine Learning detection for dropped file 13->126 process6 dnsIp7 60 thehumancondition.com 50.87.226.149, 443, 49709, 49710 UNIFIEDLAYER-AS-1US United States 17->60 62 185.174.137.70, 49703, 80 SUPERSERVERSDATACENTERRU Russian Federation 17->62 64 4 other IPs or domains 17->64 48 C:\Users\user\AppData\Roaming\swtwrii, PE32 17->48 dropped 50 C:\Users\user\AppData\Roaming\cdtwrii, PE32 17->50 dropped 52 C:\Users\user\AppData\Local\Temp\F4C4.dll, PE32 17->52 dropped 54 10 other malicious files 17->54 dropped 84 System process connects to network (likely due to code injection or exploit) 17->84 86 Benign windows process drops PE files 17->86 88 Injects code into the Windows Explorer (explorer.exe) 17->88 90 3 other signatures 17->90 22 AB71.exe 20 17->22         started        27 BC7B.exe 17->27         started        29 explorer.exe 17->29         started        31 8 other processes 17->31 file8 signatures9 process10 dnsIp11 70 t.me 149.154.167.99, 443, 49704 TELEGRAMRU United Kingdom 22->70 72 95.216.181.10, 49705, 80 HETZNER-ASDE Germany 22->72 56 C:\ProgramData\sqlite3.dll, PE32 22->56 dropped 92 Multi AV Scanner detection for dropped file 22->92 94 Detected unpacking (changes PE section rights) 22->94 96 Detected unpacking (overwrites its own PE header) 22->96 114 2 other signatures 22->114 33 cmd.exe 22->33         started        98 Machine Learning detection for dropped file 27->98 100 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 27->100 116 3 other signatures 27->116 74 starvestitibo.org 29->74 102 System process connects to network (likely due to code injection or exploit) 29->102 104 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 29->104 106 Tries to steal Mail credentials (via file / registry access) 29->106 58 C:\Users\user\AppData\Local\...\rovwer.exe, PE32 31->58 dropped 108 Writes to foreign memory regions 31->108 110 Allocates memory in foreign processes 31->110 112 Injects a PE file into a foreign processes 31->112 35 B120.exe 14 31->35         started        38 conhost.exe 31->38         started        40 regsvr32.exe 31->40         started        42 3 other processes 31->42 file12 signatures13 process14 dnsIp15 44 conhost.exe 33->44         started        46 timeout.exe 33->46         started        68 api.2ip.ua 162.0.217.254, 443, 49707 ACPCA Canada 35->68 process16
Threat name:
Win32.Trojan.Chapak
Status:
Malicious
First seen:
2022-10-29 16:21:08 UTC
File Type:
PE (Exe)
Extracted files:
30
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:djvu family:redline family:smokeloader family:vidar botnet:1752 botnet:517 botnet:mario23_10 backdoor collection discovery infostealer persistence ransomware spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Detected Djvu ransomware
Detects Smokeloader packer
Djvu Ransomware
RedLine
RedLine payload
SmokeLoader
Vidar
Malware Config
C2 Extraction:
https://t.me/slivetalks
https://c.im/@xinibin420
http://winnlinne.com/lancer/get.php
167.235.252.160:10642
Unpacked files
SH256 hash:
b88f56ff0f7a32d91fe1ab6f6a2920312f1b49f7cf2c2476d5e88458b0f63e6d
MD5 hash:
819fa574fc96e4da7b0212e5c77d04fe
SHA1 hash:
0c29ac0aa7872bf8f3d974f64abc50ce18f5d214
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe b88f56ff0f7a32d91fe1ab6f6a2920312f1b49f7cf2c2476d5e88458b0f63e6d

(this sample)

  
Delivery method
Distributed via web download

Comments