MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bc10525a0911ba2c9c472e9d7130242e9f4c2c97bb0fce53bc4b97e42f8a2b36. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: bc10525a0911ba2c9c472e9d7130242e9f4c2c97bb0fce53bc4b97e42f8a2b36
SHA3-384 hash: ae39208631c9cf5a8ab4c252c6302654bf475d3677a776b08ee459f201b2e504da97a2d7eb3f5b11b89a8389d905a62a
SHA1 hash: 6b9509635732c7fff640d65911e5a32a01573d4a
MD5 hash: e9b89f25e9e8d52c313f26e0429068d8
humanhash: colorado-cat-failed-eighteen
File name:E9B89F25E9E8D52C313F26E0429068D8.exe
Download: download sample
Signature RedLineStealer
File size:2'735'999 bytes
First seen:2021-07-25 16:00:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 49152:xcBbPkZVi7iKiF8cUvFyPOtPe3ri/lkmc6dHHpt/KyfI1KV1byEwJ84vLRaBtIly:x7ri7ixZUvFyPcPe3rlwpLfTV1tCvLUZ
Threatray 232 similar samples on MalwareBazaar
TLSH T161C53312BFC6C4F7DA4664309A842F75F1F5C3562B1008A37B90DA1F6F2D9B5902E4AB
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.56.146.60:51431

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.56.146.60:51431 https://threatfox.abuse.ch/ioc/162770/

Intelligence


File Origin
# of uploads :
1
# of downloads :
186
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
E9B89F25E9E8D52C313F26E0429068D8.exe
Verdict:
No threats detected
Analysis date:
2021-07-25 16:05:08 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Searching for the window
Moving a file to the %temp% subdirectory
Connection attempt
Sending a custom TCP request
DNS request
Running batch commands
Sending an HTTP GET request
Deleting a recently created file
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Backstage Stealer SmokeLoader Socelars V
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Backstage Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 453929 Sample: Sm87oiWs6g.exe Startdate: 25/07/2021 Architecture: WINDOWS Score: 100 151 google.vrthcobj.com 2->151 179 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->179 181 Multi AV Scanner detection for domain / URL 2->181 183 Antivirus detection for URL or domain 2->183 185 13 other signatures 2->185 13 Sm87oiWs6g.exe 15 2->13         started        signatures3 process4 file5 119 C:\Users\user\AppData\...\setup_install.exe, PE32 13->119 dropped 121 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32+ 13->121 dropped 123 C:\Users\user\AppData\Local\...\sahiba_6.txt, PE32 13->123 dropped 125 10 other files (none is malicious) 13->125 dropped 16 setup_install.exe 1 13->16         started        process6 dnsIp7 145 lotzini.xyz 104.21.40.57, 49716, 80 CLOUDFLARENETUS United States 16->145 147 127.0.0.1 unknown unknown 16->147 175 Detected unpacking (changes PE section rights) 16->175 177 Performs DNS queries to domains with low reputation 16->177 20 cmd.exe 1 16->20         started        22 cmd.exe 1 16->22         started        24 cmd.exe 1 16->24         started        26 5 other processes 16->26 signatures8 process9 process10 28 sahiba_6.exe 20->28         started        33 sahiba_4.exe 14 5 22->33         started        35 sahiba_3.exe 89 24->35         started        37 sahiba_2.exe 1 26->37         started        39 sahiba_7.exe 26->39         started        41 sahiba_1.exe 2 26->41         started        43 sahiba_5.exe 14 3 26->43         started        dnsIp11 161 37.0.11.9, 49726, 80 WKD-ASIE Netherlands 28->161 163 103.155.93.196 TWIDC-AS-APTWIDCLimitedHK unknown 28->163 169 8 other IPs or domains 28->169 127 C:\Users\...\yvty9VSrwccR69AnB7sCanZN.exe, PE32 28->127 dropped 129 C:\Users\...\mrLCr1GvvKFCfRvSlF2wZr7g.exe, PE32 28->129 dropped 131 C:\Users\...\kk1sUblewEybANj4EJNBmsWX.exe, PE32 28->131 dropped 141 27 other files (23 malicious) 28->141 dropped 193 Drops PE files to the document folder of the user 28->193 195 May check the online IP address of the machine 28->195 197 Tries to harvest and steal browser information (history, passwords, etc) 28->197 199 Disable Windows Defender real time protection (registry) 28->199 45 Gc62t83i4z16Ew5kcdQpMExM.exe 28->45         started        48 mrLCr1GvvKFCfRvSlF2wZr7g.exe 28->48         started        50 KWp2FYJPxewm9gZRXEUIL6It.exe 28->50         started        63 2 other processes 28->63 165 cdn.discordapp.com 162.159.134.233, 443, 49717 CLOUDFLARENETUS United States 33->165 133 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 33->133 dropped 201 Detected unpacking (overwrites its own PE header) 33->201 52 LzmwAqmV.exe 33->52         started        171 2 other IPs or domains 35->171 143 12 other files (none is malicious) 35->143 dropped 203 Detected unpacking (changes PE section rights) 35->203 205 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 35->205 207 Tries to steal Crypto Currency Wallets 35->207 135 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 37->135 dropped 209 DLL reload attack detected 37->209 211 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 37->211 213 Renames NTDLL to bypass HIPS 37->213 215 Checks if the current machine is a virtual machine (disk enumeration) 37->215 55 explorer.exe 37->55 injected 167 ip-api.com 208.95.112.1, 49723, 80 TUT-ASUS United States 39->167 173 2 other IPs or domains 39->173 137 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 39->137 dropped 139 C:\Users\user\AppData\...\aaa_v005[1].dll, DOS 39->139 dropped 57 11111.exe 39->57         started        59 11111.exe 39->59         started        217 Creates processes via WMI 41->217 61 sahiba_1.exe 41->61         started        file12 signatures13 process14 file15 191 Sample uses process hollowing technique 45->191 105 C:\Users\user\AppData\...\askinstall54.exe, PE32 52->105 dropped 107 C:\Users\user\AppData\...\OLKbrowser.exe, PE32 52->107 dropped 109 C:\Users\user\AppData\Local\Temp\3002.exe, PE32 52->109 dropped 117 4 other files (none is malicious) 52->117 dropped 65 Chrome2.exe 52->65         started        68 3002.exe 52->68         started        71 jhuuee.exe 52->71         started        76 4 other processes 52->76 111 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 61->111 dropped 113 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 61->113 dropped 115 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 61->115 dropped 74 conhost.exe 61->74         started        signatures16 process17 dnsIp18 97 C:\Users\user\AppData\...\services64.exe, PE32+ 65->97 dropped 78 cmd.exe 65->78         started        187 Creates processes via WMI 68->187 81 3002.exe 68->81         started        85 conhost.exe 68->85         started        153 192.168.2.1 unknown unknown 71->153 99 C:\Users\user\AppData\Local\Temp\22222.exe, PE32 71->99 dropped 101 C:\Users\user\AppData\...\aaa_v005[1].dll, DOS 71->101 dropped 87 11111.exe 71->87         started        155 91.241.19.12 REDBYTES-ASRU Russian Federation 76->155 157 88.99.66.31 HETZNER-ASDE Germany 76->157 159 144.202.76.47 AS-CHOOPAUS United States 76->159 189 Sample uses process hollowing technique 76->189 89 conhost.exe 76->89         started        file19 signatures20 process21 dnsIp22 219 Uses schtasks.exe or at.exe to add and modify task schedules 78->219 91 conhost.exe 78->91         started        93 schtasks.exe 78->93         started        149 172.67.222.125 CLOUDFLARENETUS United States 81->149 103 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 81->103 dropped 95 conhost.exe 81->95         started        221 Tries to harvest and steal browser information (history, passwords, etc) 87->221 file23 signatures24 process25
Gathering data
Threat name:
Win32.Trojan.Racealer
Status:
Malicious
First seen:
2021-07-24 11:39:05 UTC
AV detection:
30 of 46 (65.22%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:903 botnet:933 botnet:ani aspackv2 backdoor evasion infostealer stealer suricata trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Nirsoft
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE GCleaner Downloader Activity M1
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Vidar/Arkei Stealer Client Data Upload
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
Malware Config
C2 Extraction:
https://shpak125.tumblr.com/
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
gnkyeyeata.xyz:80
Unpacked files
SH256 hash:
8ce41e1db2e19e3bf46793bd51ac42a93eaca5af2102b85614e653fa728f5a50
MD5 hash:
ca844e30d2d593cedb4cac788db6d684
SHA1 hash:
e103216d65e014f39e42c651d51976eaae56d82a
SH256 hash:
95dcf5e1ac6d8aee77ed9763f59d33428cb24931c1d012f7231e033b833dbed1
MD5 hash:
9e7a24c0296a97f213e69b849679194a
SHA1 hash:
5f77dc13ea7d95ba038194b9d45b9e13a1aedbe7
SH256 hash:
7c96f13f105651f84e6f052b5448dbca9364fedc8e5c60cd0491b388c1e00de3
MD5 hash:
5cd2236454e4fa14078be7fe993d87e1
SHA1 hash:
c9f1129c63267f66f2bb0874f109ce80d2b7467e
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
dd5ac4469562c4d32e10983c14285e3c33849267cbf4c198d0427b21c56c49b2
MD5 hash:
aa76e329fd4fc560c0f8f6b2f224d3da
SHA1 hash:
bbbd3c4843bed7d90d7d3c5ce62c6e47639f8a14
SH256 hash:
c74894fe98864ade516c9e54f2258a23ed451feadfa2de53a7c626385b549b22
MD5 hash:
e44b6cb9e7111de178fbabf3ac1cba76
SHA1 hash:
b15d8d52864a548c42a331a574828824a65763ff
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
830414f5557b196ac504af98b9f506b841c8229a67f55518b826931818317bc2
MD5 hash:
925f6ec37ab40ea6f2ebe36d1f5513a7
SHA1 hash:
4b4189c6c650d33537192e5a5a099a850fa56fb6
SH256 hash:
8f70ea35a902211a223e2cdf80bc48315a1d383810c8bef68b61027cec80135c
MD5 hash:
8c9ed3d0b6f68c02cef659fec67e724b
SHA1 hash:
3526faddd2e9252fac8a3080f71706759d9b1d3c
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
afbf5fae4700b83df46ff7f32004393085bfb94956d59ec1371310ab728b8346
MD5 hash:
c138f4eedf9f9923352d37758eb83968
SHA1 hash:
3bc837b4d644aed88751330a7d9feb62c830d203
SH256 hash:
bc10525a0911ba2c9c472e9d7130242e9f4c2c97bb0fce53bc4b97e42f8a2b36
MD5 hash:
e9b89f25e9e8d52c313f26e0429068d8
SHA1 hash:
6b9509635732c7fff640d65911e5a32a01573d4a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments