MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c07572117f9dda3d61518694a205940da38d6d0baef87df01deacdefefe6fd81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 10 File information Comments

SHA256 hash: c07572117f9dda3d61518694a205940da38d6d0baef87df01deacdefefe6fd81
SHA3-384 hash: 638d1767a8193928fd4a6753eb256f385559a91f11b06021eef5955040e5134d47f2832f4856dcd5f077b4e25cb954ac
SHA1 hash: 71e6f98115f5ed521287fd8244279839dfc5b2d9
MD5 hash: f498d10db926448bfedaaa0ee87fd389
humanhash: stairway-burger-moon-nuts
File name:Install.exe
Download: download sample
Signature RedLineStealer
File size:5'289'984 bytes
First seen:2023-05-24 08:05:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 71dac11c80b80d1f1b6b3c60718d874a (2 x RedLineStealer, 2 x PrivateLoader, 1 x Amadey)
ssdeep 98304:5dE4q2f1COC8gAMY91fxfMPHgAUHWDBXDupiS0+OxAy6sX2dv+YGPd/TJV4QNCj:GdpAMY91ZPQBXXSrix6snd/TJV4T
Threatray 15 similar samples on MalwareBazaar
TLSH T186362350B9DB7919F478F6761BC2C3BE9A9EFCEDA11B0B3B1184320B87506017E82975
TrID 52.9% (.EXE) Win32 Executable (generic) (4505/5/1)
23.5% (.EXE) Generic Win/DOS Executable (2002/3)
23.5% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon e0d0a8cceaf4f830 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
83.97.73.122:19062

Intelligence


File Origin
# of uploads :
1
# of downloads :
265
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Install.exe
Verdict:
Malicious activity
Analysis date:
2023-05-24 08:06:31 UTC
Tags:
privateloader evasion opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
DNS request
Replacing files
Sending a custom TCP request
Sending an HTTP GET request
Reading critical registry keys
Launching a service
Launching a process
Creating a file
Sending a UDP request
Forced system process termination
Searching for synchronization primitives
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the %temp% subdirectories
Creating a window
Creating a file in the Program Files subdirectories
Creating a service
Searching for the window
Blocking the Windows Defender launch
Query of malicious DNS domain
Enabling autorun for a service
Adding exclusions to Windows Defender
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
lolbin packed packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Fabookie, Nymaim, PrivateLoader, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Fabookie
Yara detected Nymaim
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 874423 Sample: Install.exe Startdate: 24/05/2023 Architecture: WINDOWS Score: 100 190 Malicious sample detected (through community Yara rule) 2->190 192 Antivirus detection for URL or domain 2->192 194 Antivirus detection for dropped file 2->194 196 16 other signatures 2->196 10 Install.exe 10 40 2->10         started        15 PowerControl_Svc.exe 2->15         started        17 PowerControl_Svc.exe 2->17         started        19 5 other processes 2->19 process3 dnsIp4 182 188.114.96.7 CLOUDFLARENETUS European Union 10->182 184 93.186.225.194 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 10->184 188 12 other IPs or domains 10->188 126 C:\Users\...\lf4kMmWCRn32vQcgT4m0CtS2.exe, PE32 10->126 dropped 128 C:\Users\...\cceLt1mdnUZQcquFyiJh05iI.exe, PE32 10->128 dropped 130 C:\Users\...\YUkNH4QBxCf4XlIpVoqtvvlD.exe, PE32 10->130 dropped 140 13 other malicious files 10->140 dropped 252 Detected unpacking (changes PE section rights) 10->252 254 Creates HTML files with .exe extension (expired dropper behavior) 10->254 256 Disables Windows Defender (deletes autostart) 10->256 260 2 other signatures 10->260 21 lf4kMmWCRn32vQcgT4m0CtS2.exe 17 10->21         started        25 0Z7RQ6yFymE6MClO2Rt0JHr5.exe 10->25         started        27 YUkNH4QBxCf4XlIpVoqtvvlD.exe 10->27         started        34 5 other processes 10->34 132 C:\Users\...\oIngk6Yenk2MbZ_CXph330vJ.exe, MS-DOS 15->132 dropped 134 C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS 15->134 dropped 30 oIngk6Yenk2MbZ_CXph330vJ.exe 15->30         started        136 C:\Users\...\jdNggl_E8BU6dAbuH1t2Qwpi.exe, MS-DOS 17->136 dropped 138 C:\Users\user\AppData\Local\...\WWW14[2].bmp, MS-DOS 17->138 dropped 32 jdNggl_E8BU6dAbuH1t2Qwpi.exe 17->32         started        186 4.231.128.59 LEVEL3US United States 19->186 258 Query firmware table information (likely to detect VMs) 19->258 file5 signatures6 process7 dnsIp8 166 149.154.167.99 TELEGRAMRU United Kingdom 21->166 168 94.142.138.113 IHOR-ASRU Russian Federation 21->168 110 C:\Users\...\u_yGjLm_eYl6lceiMweYP8Bx.exe, MS-DOS 21->110 dropped 112 C:\Users\user\AppData\Local\...\WWW14[1].bmp, MS-DOS 21->112 dropped 114 C:\...\PowerControl_Svc.exe, PE32 21->114 dropped 36 u_yGjLm_eYl6lceiMweYP8Bx.exe 21->36         started        41 schtasks.exe 21->41         started        116 C:\Users\user\AppData\Local\...\WWW14[2].bmp, MS-DOS 25->116 dropped 118 C:\...\PowerControl_Svc.exe, PE32 25->118 dropped 43 u_yGjLm_eYl6lceiMweYP8Bx.exe 25->43         started        55 2 other processes 25->55 226 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 27->226 228 Maps a DLL or memory area into another process 27->228 230 Checks if the current machine is a virtual machine (disk enumeration) 27->230 232 Creates a thread in another existing process (thread injection) 27->232 45 explorer.exe 27->45 injected 234 Multi AV Scanner detection for dropped file 30->234 236 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 30->236 238 Tries to detect sandboxes and other dynamic analysis tools (window names) 30->238 240 Tries to evade debugger and weak emulator (self modifying code) 30->240 242 Tries to detect virtualization through RDTSC time measurements 32->242 170 185.81.68.115 KLNOPT-ASFI Finland 34->170 172 103.100.211.218 HKKFGL-AS-APHKKwaifongGroupLimitedHK Hong Kong 34->172 174 5 other IPs or domains 34->174 120 C:\Users\user\AppData\Local\...\is-6CCR1.tmp, PE32 34->120 dropped 122 C:\Users\user\AppData\Local\...\v6384145.exe, PE32 34->122 dropped 124 C:\Users\user\AppData\Local\...\d1480229.exe, PE32 34->124 dropped 244 Writes to foreign memory regions 34->244 246 Allocates memory in foreign processes 34->246 248 Tries to steal Crypto Currency Wallets 34->248 250 Injects a PE file into a foreign processes 34->250 47 is-6CCR1.tmp 34->47         started        49 v6384145.exe 34->49         started        51 AppLaunch.exe 34->51         started        53 conhost.exe 34->53         started        file9 signatures10 process11 dnsIp12 152 85.217.144.228 WS171-ASRU Bulgaria 36->152 160 8 other IPs or domains 36->160 92 C:\Users\...\yiqnqOp9K67FRhKCk4uwgyqx.exe, PE32 36->92 dropped 94 C:\Users\...\uluJnh7mwpevML2P3hGnTRu8.exe, PE32+ 36->94 dropped 96 C:\Users\...\t_hrI0fCX3fq2l4JFAdtpbm8.exe, PE32 36->96 dropped 100 10 other malicious files 36->100 dropped 198 Multi AV Scanner detection for dropped file 36->198 200 Detected unpacking (changes PE section rights) 36->200 202 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 36->202 222 6 other signatures 36->222 57 FRuV2WTuslcya7sI8wrlsE27.exe 36->57         started        60 ABh18h_Ehi75p_4tn33yYOYB.exe 36->60         started        63 conhost.exe 41->63         started        162 3 other IPs or domains 43->162 98 C:\Users\...\uUTsl6JFBHk490Xo8enlS5qv.exe, PE32+ 43->98 dropped 102 12 other malicious files 43->102 dropped 204 Query firmware table information (likely to detect VMs) 43->204 206 Disables Windows Defender (deletes autostart) 43->206 208 Disable Windows Defender real time protection (registry) 43->208 154 103.233.24.19 WEBWERKS-AS-INWebWerksIndiaPvtLtdIN India 45->154 156 175.126.109.15 SKB-ASSKBroadbandCoLtdKR Korea Republic of 45->156 164 4 other IPs or domains 45->164 104 11 other malicious files 45->104 dropped 210 System process connects to network (likely due to code injection or exploit) 45->210 212 Benign windows process drops PE files 45->212 214 Hides that the sample has been downloaded from the Internet (zone.identifier) 45->214 65 rundll32.exe 45->65         started        67 rundll32.exe 45->67         started        69 rundll32.exe 45->69         started        106 8 other files (7 malicious) 47->106 dropped 71 Rec524.exe 47->71         started        108 2 other malicious files 49->108 dropped 74 v1846404.exe 49->74         started        158 157.254.164.98 BEANFIELDCA United States 51->158 216 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 51->216 218 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 51->218 220 Tries to steal Crypto Currency Wallets 51->220 76 2 other processes 55->76 file13 signatures14 process15 dnsIp16 224 Tries to harvest and steal browser information (history, passwords, etc) 57->224 142 C:\Users\user\AppData\Local\...\is-LHF6I.tmp, PE32 60->142 dropped 176 45.12.253.56 CMCSUS Germany 71->176 178 45.12.253.72 CMCSUS Germany 71->178 180 45.12.253.75 CMCSUS Germany 71->180 144 C:\Users\user\AppData\...\28iAXUUw.exe, PE32 71->144 dropped 78 cmd.exe 71->78         started        81 28iAXUUw.exe 71->81         started        146 C:\Users\user\AppData\Local\...\b4392324.exe, PE32 74->146 dropped 148 C:\Users\user\AppData\Local\...\a6438495.exe, PE32 74->148 dropped 83 b4392324.exe 74->83         started        86 a6438495.exe 74->86         started        file17 signatures18 process19 dnsIp20 88 conhost.exe 78->88         started        90 taskkill.exe 78->90         started        150 83.97.73.122 UNACS-AS-BG8000BurgasBG Germany 83->150 262 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 83->262 264 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 83->264 266 Tries to harvest and steal browser information (history, passwords, etc) 83->266 268 Multi AV Scanner detection for dropped file 86->268 270 Disable Windows Defender notifications (registry) 86->270 signatures21 process22
Threat name:
Win32.Trojan.PrivateLoader
Status:
Malicious
First seen:
2023-05-24 08:06:07 UTC
File Type:
PE (Exe)
Extracted files:
57
AV detection:
14 of 23 (60.87%)
Threat level:
  5/5
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader loader main spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
PrivateLoader
Malware Config
C2 Extraction:
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
45.15.156.229
85.208.136.10
94.131.106.196
5.181.80.133
94.142.138.131
94.142.138.113
208.67.104.60
Unpacked files
SH256 hash:
7350ca496d3fb7ba42a01ca94481b38728f5673354de7858959bfecc734f7316
MD5 hash:
1607c8fd2c2e7cb1cce6accf479e2587
SHA1 hash:
92e13003426ded72f2887ebe726dbcd1ec3ed451
Detections:
PrivateLoader win_privateloader_w0 win_privateloader_a0
SH256 hash:
c07572117f9dda3d61518694a205940da38d6d0baef87df01deacdefefe6fd81
MD5 hash:
f498d10db926448bfedaaa0ee87fd389
SHA1 hash:
71e6f98115f5ed521287fd8244279839dfc5b2d9
Malware family:
PrivateLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:privateloader
Author:andretavare5
Description:PrivateLoader pay-per-install malware
Rule name:Privateloader_Main_Component
Description:Detects PrivateLoader Main Component
Rule name:TeslaCryptPackedMalware
Rule name:Windows_Trojan_PrivateLoader_96ac2734
Author:Elastic Security
Rule name:win_privateloader
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service
Rule name:win_privateloader_w0
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments