MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c03c8a4852301c1c54ed27ef130d0de4cdfb98584adef3dda2a096177016a18b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 2 YARA 16 File information Comments

SHA256 hash: c03c8a4852301c1c54ed27ef130d0de4cdfb98584adef3dda2a096177016a18b
SHA3-384 hash: 6199a7d9dff7421cd8828bd2788b7389326ded4c8378a1c279cf2f4f88e249b4d9f729dd72d3e1a5db1c130804d6cd2b
SHA1 hash: 76c80e3222e5f5850d376f165a93dc245ca239a4
MD5 hash: 04c54208f1b25e8acfdaa7254de39187
humanhash: helium-massachusetts-four-south
File name:C03C8A4852301C1C54ED27EF130D0DE4CDFB98584ADEF.exe
Download: download sample
Signature RedLineStealer
File size:3'372'546 bytes
First seen:2021-10-23 19:25:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:JMzyukhOLpEScAlkOJvgjVxpb5O4tos84jv:JMNkhK4E5JuZtoWb
Threatray 5'114 similar samples on MalwareBazaar
TLSH T1D6F5335F22E5F112C6E3EF784B95BB365F3173A0A6A1AE67470927891D47CD00C932B8
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RaccoonStealer RedLineStealer


Avatar
abuse_ch
RaccoonStealer C2:
45.129.99.59:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.129.99.59:80 https://threatfox.abuse.ch/ioc/236780/
144.76.183.53:5634 https://threatfox.abuse.ch/ioc/236825/

Intelligence


File Origin
# of uploads :
1
# of downloads :
590
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a window
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code contains very large strings
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Renames NTDLL to bypass HIPS
Sigma detected: Suspicious Svchost Process
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 508135 Sample: C03C8A4852301C1C54ED27EF130... Startdate: 23/10/2021 Architecture: WINDOWS Score: 100 80 88.99.66.31 HETZNER-ASDE Germany 2->80 82 88.99.75.82 HETZNER-ASDE Germany 2->82 84 4 other IPs or domains 2->84 104 Multi AV Scanner detection for domain / URL 2->104 106 Antivirus detection for URL or domain 2->106 108 Antivirus detection for dropped file 2->108 110 15 other signatures 2->110 10 C03C8A4852301C1C54ED27EF130D0DE4CDFB98584ADEF.exe 10 2->10         started        signatures3 process4 file5 50 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->50 dropped 13 setup_installer.exe 15 10->13         started        process6 file7 52 C:\Users\user\AppData\Local\...\sotema_6.txt, PE32 13->52 dropped 54 C:\Users\user\AppData\Local\...\sotema_4.txt, PE32 13->54 dropped 56 C:\Users\user\AppData\Local\...\sotema_3.txt, PE32 13->56 dropped 58 10 other files (5 malicious) 13->58 dropped 16 setup_install.exe 1 13->16         started        process8 dnsIp9 74 192.64.119.193 NAMECHEAP-NETUS United States 16->74 76 8.8.8.8 GOOGLEUS United States 16->76 78 127.0.0.1 unknown unknown 16->78 42 C:\Users\user\AppData\...\sotema_5.exe (copy), PE32 16->42 dropped 44 C:\Users\user\AppData\...\sotema_3.exe (copy), PE32 16->44 dropped 46 C:\Users\user\AppData\...\sotema_2.exe (copy), PE32 16->46 dropped 48 4 other files (none is malicious) 16->48 dropped 100 Detected unpacking (changes PE section rights) 16->100 102 Machine Learning detection for dropped file 16->102 21 cmd.exe 1 16->21         started        23 cmd.exe 1 16->23         started        25 cmd.exe 1 16->25         started        27 4 other processes 16->27 file10 signatures11 process12 process13 29 sotema_5.exe 21->29         started        34 sotema_2.exe 1 23->34         started        36 sotema_1.exe 5 25->36         started        38 sotema_4.exe 1 27->38         started        40 sotema_3.exe 12 27->40         started        dnsIp14 86 45.142.182.152 XSSERVERNL Germany 29->86 88 136.144.41.133 WORLDSTREAMNL Netherlands 29->88 96 11 other IPs or domains 29->96 60 C:\Users\...\tm7P72cUOzR_VQ7syTkAZibA.exe, PE32 29->60 dropped 62 C:\Users\...\qhivOCXp1_GLQkbtdAvTtHzP.exe, PE32 29->62 dropped 64 C:\Users\...\qcn3_xGT25tOTVzP9MUB7Gti.exe, PE32 29->64 dropped 72 23 other malicious files 29->72 dropped 112 Drops PE files to the document folder of the user 29->112 114 Creates HTML files with .exe extension (expired dropper behavior) 29->114 116 Disable Windows Defender real time protection (registry) 29->116 66 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 34->66 dropped 118 DLL reload attack detected 34->118 120 Detected unpacking (changes PE section rights) 34->120 122 Renames NTDLL to bypass HIPS 34->122 124 3 other signatures 34->124 68 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 36->68 dropped 90 208.95.112.1 TUT-ASUS United States 38->90 92 157.240.17.35 FACEBOOKUS United States 38->92 98 2 other IPs or domains 38->98 70 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 38->70 dropped 94 74.114.154.22 AUTOMATTICUS Canada 40->94 file15 signatures16
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-06-23 21:42:26 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:921 botnet:cana botnet:servani aspackv2 backdoor evasion infostealer spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
176.111.174.254:56328
https://sergeevih43.tumblr.com/
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
http://xacokuo8.top/
http://hajezey1.top/
87.251.71.195:82
https://mas.to/@xeroxxx
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
aa6cc42ad1c627460a4c54cfa46fa1934518c510d2bdb323ee119c460136ed3f
MD5 hash:
f2eb93b3bbe3cad8a4b76e74ffd3ccff
SHA1 hash:
e018afa2e24e5eb03598d37d9142674ad1d7ac2f
SH256 hash:
7296d60423fbfc4877e7bbb0c1352d0756908f9fbc53679bce463320e3a382f0
MD5 hash:
7ca1af0d05d832e6039ddb2629c6007f
SHA1 hash:
b3cf5b027fa6ee5a6cebb33bde0b36eb17e9956c
SH256 hash:
8c7cdb6916702d2387737927da9a3c49a6f4c1033545c1ed9bb37fc2829e4803
MD5 hash:
dca556c5c11a934a767c12ac44f179e5
SHA1 hash:
900f5ad3481cdb4f82dccf97d0b7ab272e599dce
SH256 hash:
de427ec4cbf5ced1935dfc885e1c7fd3899ebc9d5465a5fcfa213556a5fd2e67
MD5 hash:
f4a6ad0d61120257614f97a62c7d812a
SHA1 hash:
db7bd48b5400233d440dfe9c556aab938b6f75f4
SH256 hash:
86f42ae6f24a8f85ef20833fa0a027271b3835981f0a24dad0f38ff9c941a32f
MD5 hash:
04ed7a3f9fedede99d8e41201e5d73f1
SHA1 hash:
2f5700e320b5c6df3ece905affa5a816bc6b6f87
SH256 hash:
d417bd4de6a5227f5ea5cff3567e74fe2b2a25c0a80123b7b37b27db89adc384
MD5 hash:
5668cb771643274ba2c375ec6403c266
SHA1 hash:
dd78b03428b99368906fe62fc46aaaf1db07a8b9
SH256 hash:
10a122bd647c88aa23f96687e26b251862e83be9dbb89532f4a578689547972d
MD5 hash:
89c739ae3bbee8c40a52090ad0641d31
SHA1 hash:
d0f7dc9a0a3e52af0f9f9736f26e401636c420a1
SH256 hash:
16907ff2b4416966ff7fdade8794538162922bab890b64cb740581194e6b1767
MD5 hash:
ade27001607a210b105fa8660a52d571
SHA1 hash:
cccca05cba31685e49c8216800831826fa8b9841
SH256 hash:
92f609f0932717ebf8ad7b9b3f049348d10f74442864e146dec3150cc684baf6
MD5 hash:
cfb846afa58b9a2fb8018e55ef841f90
SHA1 hash:
8a6bfe762bf3093b1fff0211752a34dc5ee57319
SH256 hash:
55aa704cb7295338dc86945d817f54db3f7485710fa3af1761816d280abbf104
MD5 hash:
2c581b9389d07e810f34ba230c0e8c18
SHA1 hash:
761b97c9c3249e7100667c0d93fa41f5444347a5
SH256 hash:
0bcf14216198351151d34d3e6ea6c05bf06c62eee05e15804ba132ea455b3710
MD5 hash:
bcb71fb45d694263db5beb8187869059
SHA1 hash:
582eda9bb90f9a64a41704b80f5ef2aded5142a3
SH256 hash:
a281b60e92cae4ea1c2689c817a5a0fdd9fe6143bc7f77c1fda40035128271f2
MD5 hash:
978b95a0627e4650abc03540aba7924a
SHA1 hash:
2743329e8f5ff4b2dfc98b27ede64ffd0676d3e2
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
6c07b4b3a67e0ffbc1dee4b36919c4417f4c2aa3bdda0e5f2effbfd5c77ec27a
MD5 hash:
d3619bcabd95df2b6f1f2bfefd92ff72
SHA1 hash:
81e32a2c0b5e963c15308c485ab10fd990be240d
SH256 hash:
c03c8a4852301c1c54ed27ef130d0de4cdfb98584adef3dda2a096177016a18b
MD5 hash:
04c54208f1b25e8acfdaa7254de39187
SHA1 hash:
76c80e3222e5f5850d376f165a93dc245ca239a4
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:RedOctoberPluginCollectInfo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments