MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c576f31c42f0b76fdfa15f578e94b29d8d41e9960075d4f603a825aa4c67f77a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 3 File information Comments

SHA256 hash: c576f31c42f0b76fdfa15f578e94b29d8d41e9960075d4f603a825aa4c67f77a
SHA3-384 hash: 15b13c99f00b0aaa945a2fedc29b02d564814e10d778cc9db515180282f0a6e1f6fbdf5b77e6ac6f7c6ae721ace725d9
SHA1 hash: 17572b065e253022c5cc77f44be58b54eb659ed9
MD5 hash: d5c1219657acd0e1b98aab7f537d20ce
humanhash: early-fifteen-two-mango
File name:shrs.exe
Download: download sample
Signature RedLineStealer
File size:3'315'090 bytes
First seen:2022-03-24 18:08:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 98304:UbajpzeTaReaXSJZNV/+WQ4is1acn62w2kvpDF:UuVezZNN+WSsk7Z75F
Threatray 11'296 similar samples on MalwareBazaar
TLSH T195E5335279D580F1E1710E329AA9DBB5253C7D212F24CFAB63D8266EED301C0E635B27
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter adm1n_usa32
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
222
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Creating a process from a recently created file
Creating a file in the Program Files directory
Creating a file in the %temp% directory
Launching a process
DNS request
Sending an HTTP GET request
Creating a process with a hidden window
Reading critical registry keys
Sending a custom TCP request
Sending a UDP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Launching the default Windows debugger (dwwin.exe)
Running batch commands
Unauthorized injection to a recently created process
Query of malicious DNS domain
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching a tool to kill processes
Sending an HTTP GET request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cookie Stealer RedLine SmokeLoader Socel
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Drops PE files to the document folder of the user
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Cookie Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 596652 Sample: shrs.exe Startdate: 24/03/2022 Architecture: WINDOWS Score: 100 91 142.250.185.110 GOOGLEUS United States 2->91 93 142.250.185.238 GOOGLEUS United States 2->93 95 10 other IPs or domains 2->95 99 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->99 101 Malicious sample detected (through community Yara rule) 2->101 103 Antivirus detection for URL or domain 2->103 105 12 other signatures 2->105 9 shrs.exe 12 2->9         started        signatures3 process4 file5 55 C:\Users\user\Desktop\wf-game.exe, PE32 9->55 dropped 57 C:\Users\user\Desktop\pzyh.exe, PE32 9->57 dropped 59 C:\Users\user\Desktop\pub2.exe, PE32 9->59 dropped 61 4 other malicious files 9->61 dropped 12 pub2.exe 9->12         started        16 pzyh.exe 9->16         started        19 wf-game.exe 4 9->19         started        21 4 other processes 9->21 process6 dnsIp7 63 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 12->63 dropped 125 Antivirus detection for dropped file 12->125 127 DLL reload attack detected 12->127 129 Detected unpacking (changes PE section rights) 12->129 139 5 other signatures 12->139 23 explorer.exe 12->23 injected 77 ip-api.com 208.95.112.1, 49779, 80 TUT-ASUS United States 16->77 79 72.52.178.23 LIQUIDWEBUS United States 16->79 81 157.240.17.35 FACEBOOKUS United States 16->81 65 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 16->65 dropped 67 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 16->67 dropped 131 Machine Learning detection for dropped file 16->131 27 jfiag3g_gg.exe 16->27         started        29 jfiag3g_gg.exe 16->29         started        69 C:\Program Files\install.dll, PE32 19->69 dropped 71 C:\Program Files\libEGL.dll, PE32+ 19->71 dropped 31 rundll32.exe 19->31         started        83 101.36.107.74, 80 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 21->83 85 148.251.234.83 HETZNER-ASDE Germany 21->85 87 2 other IPs or domains 21->87 73 C:\Users\user\Documents\...\jg4_4jaa.exe, PE32 21->73 dropped 75 C:\Users\user\AppData\Local\Temp\...\File.exe, PE32 21->75 dropped 133 Multi AV Scanner detection for dropped file 21->133 135 Detected unpacking (overwrites its own PE header) 21->135 137 Drops PE files to the document folder of the user 21->137 33 File.exe 21->33         started        35 WerFault.exe 21->35         started        38 WerFault.exe 21->38         started        file8 signatures9 process10 dnsIp11 53 C:\Users\user\AppData\Roaming\huiuvgs, PE32 23->53 dropped 107 Benign windows process drops PE files 23->107 109 Hides that the sample has been downloaded from the Internet (zone.identifier) 23->109 111 Tries to harvest and steal browser information (history, passwords, etc) 27->111 113 Writes to foreign memory regions 31->113 115 Allocates memory in foreign processes 31->115 117 Creates a thread in another existing process (thread injection) 31->117 40 svchost.exe 31->40 injected 42 svchost.exe 31->42 injected 44 svchost.exe 31->44 injected 46 svchost.exe 31->46 injected 119 Antivirus detection for dropped file 33->119 121 Multi AV Scanner detection for dropped file 33->121 123 Sample uses process hollowing technique 33->123 48 AddInProcess32.exe 33->48         started        51 AddInProcess32.exe 33->51         started        97 20.42.65.92 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 35->97 file12 signatures13 process14 dnsIp15 89 199.195.251.96 PONYNETUS United States 48->89
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2021-04-24 05:10:37 UTC
File Type:
PE (Exe)
Extracted files:
245
AV detection:
29 of 42 (69.05%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars botnet:v1 backdoor discovery evasion infostealer persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Enumerates system info in registry
Kills process with taskkill
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://www.fddnice.pw/
http://www.sokoinfo.pw/
http://www.zzhlike.pw/
http://www.wygexde.xyz/
http://al-commandoz.com/upload/
http://antalya-belek.com/upload/
http://luxurysv.com/upload/
http://massagespijkenisse.com/upload/
http://rexgorellhondaevent.com/upload/
199.195.251.96:43073
Unpacked files
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
2f409e60fd167e3621a278c7c81a02823b6e6390f7a54cf3211d5090d95bf563
MD5 hash:
453211e26211a031d20cce1a5e6d4cda
SHA1 hash:
391e465121892d4244274fe0af58dfb33fc5ef34
SH256 hash:
5a8a4f96ef1c8b3bdbe93f292d1f8c328f2b5b4c37ff595360cc09b692a8bda9
MD5 hash:
e08f31fb2d13b23f2aac1fbd710dc292
SHA1 hash:
03eeb24687c480b7f59ff81bf4eb7e044c7816f3
SH256 hash:
a7d1eb952ab3b9144387a1d6e699d881f7d47374bcbae7d70b6ab3f99583c66b
MD5 hash:
72b4c4471c07bfa485079f79a7a5c067
SHA1 hash:
02502ca0f693706ad8ed4d4c969c7631ab0cc6e6
SH256 hash:
2dec511dc09995acacd0eec9d405d6717ec40d661a06fed2dd3eead75358c886
MD5 hash:
ec0f2377d42e4480d79a629981fa6f8b
SHA1 hash:
f73fdb8a6ec1516d68c9fe0ca80e5444dd4b893e
SH256 hash:
a389fa5286a92dbb9a43d65d8e8728546eb6b5089bcce78989ef5ae280006f4b
MD5 hash:
9f62713da5daa2d40831a2fa54793501
SHA1 hash:
ce6fec6127c92e608c0546de42a09a8415cded6c
SH256 hash:
9c7786d9457e9d60a87056815be51668cf76ac5d7bd007b25f3995a828a9aeed
MD5 hash:
5158dccb20ccb96e91c89a7e08142c23
SHA1 hash:
b572b3f32c05a7e6f4d211f892665d5943a44dc9
SH256 hash:
39ed68982fd0243c6e50b57162182e415b85871e4a83f764f607a1b64e587d04
MD5 hash:
eca4350cdab1176e63fea22f9597e821
SHA1 hash:
c0110a45cdbc0012122eb970a4680e0b303444cd
SH256 hash:
606ea78eff720a51725b32f50d8b0cfcafd52f4017dba5a6b58245a42edfee8c
MD5 hash:
c4a2a13ccc61feb54c897d299332c5a4
SHA1 hash:
287889559a9add8f67deced8148e20c5a56462e4
SH256 hash:
0f616c96d12b1956412fd192bc5822ee460f56ea3e6b1c728c3409d821726d92
MD5 hash:
ccfd9e4f62c10b41e5fa40fcc4572f2d
SHA1 hash:
a6bd4fc43cb75dd933505e29df736e2f43f25da8
SH256 hash:
59780d35e8f2a0c2579d5ca7e1c39effb812f701d08a8f7792f7ba7b0ada3e72
MD5 hash:
d0ebbf6bdc26dc21e2ddface18253f84
SHA1 hash:
7c91b2205b4fd7ec06f37a50f368d769cbd4dd8e
SH256 hash:
64d31a64d08a2fbb89ea0d8ac27bf034082032d6d436c467907471d0ecb5bfea
MD5 hash:
f44ac4a51ff49f11b473af4bae740764
SHA1 hash:
015195a1f76213bbc4f61b1b1e834e4ff6da2242
Detections:
win_socelars_auto
SH256 hash:
c576f31c42f0b76fdfa15f578e94b29d8d41e9960075d4f603a825aa4c67f77a
MD5 hash:
d5c1219657acd0e1b98aab7f537d20ce
SHA1 hash:
17572b065e253022c5cc77f44be58b54eb659ed9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_Fabookie
Author:ditekSHen
Description:Detects Fabookie / ElysiumStealer
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments