MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc03001bc0a55b5ae872d210e94470745edb6d9465a87ea276a414c16ae6080a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 3 YARA 6 File information Comments

SHA256 hash: cc03001bc0a55b5ae872d210e94470745edb6d9465a87ea276a414c16ae6080a
SHA3-384 hash: 10429e66b70c7d68e1f37823a376dc3775b1946c766ab4276fea9396265e572a376688d54d2ced2d00221ee811cba2d6
SHA1 hash: 4c5608d652cf9514c750ecc12f77a09ab4122f43
MD5 hash: 85e6adb9c023cc3547303dafc074cf7a
humanhash: pizza-washington-july-michigan
File name:85E6ADB9C023CC3547303DAFC074CF7A.exe
Download: download sample
Signature RedLineStealer
File size:4'127'807 bytes
First seen:2021-06-07 05:40:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e7f9a29f2c85394521a08b9f31f6275 (291 x GuLoader, 51 x VIPKeylogger, 48 x RemcosRAT)
ssdeep 98304:J55hi396Hjee/ATcUEuc548XE70I1ubZpcs5FRyXJ+5QnV3:J55q9Gqe/AIUEuc520I1iZWsXcs5UV3
Threatray 34 similar samples on MalwareBazaar
TLSH 411633C4BB11E42AD632053C3A8D977748B9A4A4216C4E776A3C3A55BB1BD209F0FD1F
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
157.90.251.148:53294

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
157.90.251.148:53294 https://threatfox.abuse.ch/ioc/72120/
193.188.22.155:49226 https://threatfox.abuse.ch/ioc/72130/
162.55.55.250:80 https://threatfox.abuse.ch/ioc/67974/

Intelligence


File Origin
# of uploads :
1
# of downloads :
92
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
85E6ADB9C023CC3547303DAFC074CF7A.exe
Verdict:
No threats detected
Analysis date:
2021-06-07 05:42:43 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Sending a UDP request
Searching for the window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Running batch commands
Deleting a recently created file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Drops executable to a common third party application directory
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 430348 Sample: HNUQajtypz.exe Startdate: 07/06/2021 Architecture: WINDOWS Score: 100 123 8.211.6.12 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 2->123 125 217.107.34.191 RTCOMM-ASRU Russian Federation 2->125 127 3 other IPs or domains 2->127 165 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->165 167 Multi AV Scanner detection for domain / URL 2->167 169 Found malware configuration 2->169 171 11 other signatures 2->171 13 HNUQajtypz.exe 9 2->13         started        16 svchost.exe 1 2->16         started        signatures3 process4 file5 121 C:\Users\user\AppData\...\setup_installer.exe, PE32 13->121 dropped 19 setup_installer.exe 16 13->19         started        157 System process connects to network (likely due to code injection or exploit) 16->157 signatures6 process7 file8 97 C:\Users\user\AppData\...\setup_install.exe, PE32 19->97 dropped 99 C:\Users\user\AppData\Local\...\metina_8.exe, PE32 19->99 dropped 101 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 19->101 dropped 103 11 other files (5 malicious) 19->103 dropped 22 setup_install.exe 1 19->22         started        process9 dnsIp10 133 mazama.xyz 104.21.13.3, 49720, 80 CLOUDFLARENETUS United States 22->133 135 127.0.0.1 unknown unknown 22->135 137 192.168.2.1 unknown unknown 22->137 203 Detected unpacking (changes PE section rights) 22->203 205 Performs DNS queries to domains with low reputation 22->205 26 cmd.exe 1 22->26         started        28 cmd.exe 1 22->28         started        30 cmd.exe 1 22->30         started        32 8 other processes 22->32 signatures11 process12 process13 34 metina_1.exe 6 26->34         started        37 metina_5.exe 28->37         started        40 metina_3.exe 90 30->40         started        43 metina_4.exe 3 2 32->43         started        45 metina_2.exe 1 32->45         started        47 metina_6.exe 32->47         started        49 2 other processes 32->49 dnsIp14 89 2 other files (1 malicious) 34->89 dropped 51 rundll32.exe 34->51         started        79 C:\Users\user\AppData\Local\...\metina_5.tmp, PE32 37->79 dropped 181 Antivirus detection for dropped file 37->181 54 metina_5.tmp 37->54         started        147 2 other IPs or domains 40->147 91 12 other files (none is malicious) 40->91 dropped 183 Detected unpacking (changes PE section rights) 40->183 185 Detected unpacking (overwrites its own PE header) 40->185 187 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 40->187 201 2 other signatures 40->201 141 ip-api.com 208.95.112.1, 49721, 80 TUT-ASUS United States 43->141 149 3 other IPs or domains 43->149 81 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 43->81 dropped 83 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 43->83 dropped 189 May check the online IP address of the machine 43->189 191 Machine Learning detection for dropped file 43->191 58 jfiag3g_gg.exe 43->58         started        60 jfiag3g_gg.exe 43->60         started        85 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 45->85 dropped 193 DLL reload attack detected 45->193 195 Renames NTDLL to bypass HIPS 45->195 197 Checks if the current machine is a virtual machine (disk enumeration) 45->197 151 2 other IPs or domains 47->151 93 2 other files (none is malicious) 47->93 dropped 143 89.221.213.3 WEDOSCZ Czech Republic 49->143 145 101.36.107.74, 49722, 80 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 49->145 153 7 other IPs or domains 49->153 87 C:\Users\user\Documents\...\metina_8.exe, PE32 49->87 dropped 95 14 other files (none is malicious) 49->95 dropped 199 Drops PE files to the document folder of the user 49->199 62 cmd.exe 49->62         started        file15 signatures16 process17 dnsIp18 173 Writes to foreign memory regions 51->173 175 Allocates memory in foreign processes 51->175 177 Creates a thread in another existing process (thread injection) 51->177 64 svchost.exe 51->64 injected 139 limesfile.com 198.54.126.101, 49724, 80 NAMECHEAP-NETUS United States 54->139 113 C:\Users\user\AppData\...\67________F.exe, PE32 54->113 dropped 115 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 54->115 dropped 117 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 54->117 dropped 119 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 54->119 dropped 67 67________F.exe 54->67         started        179 Tries to harvest and steal browser information (history, passwords, etc) 58->179 71 conhost.exe 62->71         started        73 powershell.exe 62->73         started        file19 signatures20 process21 dnsIp22 159 Sets debug register (to hijack the execution of another thread) 64->159 161 Modifies the context of a thread in another process (thread injection) 64->161 75 svchost.exe 64->75         started        129 2.20.142.209 AKAMAI-ASN1EU European Union 67->129 131 162.0.210.44 ACPCA Canada 67->131 105 C:\Users\user\AppData\...behaviorgraphoxixegirae.exe, PE32 67->105 dropped 107 C:\Program Files (x86)\...\Lusukykoshu.exe, PE32 67->107 dropped 109 C:\Users\user\...behaviorgraphoxixegirae.exe.config, XML 67->109 dropped 111 3 other files (1 malicious) 67->111 dropped 163 Drops executable to a common third party application directory 67->163 file23 signatures24 process25 dnsIp26 155 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 75->155 207 Query firmware table information (likely to detect VMs) 75->207 signatures27
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-06-04 11:14:32 UTC
AV detection:
28 of 46 (60.87%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:elysiumstealer family:plugx family:redline family:smokeloader family:vidar aspackv2 backdoor discovery evasion infostealer persistence spyware stealer trojan upx vmprotect
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
VMProtect packed file
Checks for common network interception software
ElysiumStealer
PlugX
RedLine
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Unpacked files
SH256 hash:
f7a22d383fb7c74e0e9b4b3907eeaf44acae4fe4a741face453d107eadd9ccfe
MD5 hash:
aabc7a3044ba7ea1594c0eab199d9547
SHA1 hash:
8d4143739f9c32c66ad6ac096cec8b6725f20218
SH256 hash:
9208e495a8c36de38c8d48f31fb6d6cf5fda3a508a0f950f5cac5f34730798ed
MD5 hash:
4695e4859403ee7c907061bb2ee6bc78
SHA1 hash:
ee96ff74edc9ff438f7f2dacfe63f3ceccaa38aa
SH256 hash:
d19808c396ba4a44568024be9266beee7442d26da23c2a372f7707c0b8232d8a
MD5 hash:
244925bfacb9a951c3cb1bf346b8372c
SHA1 hash:
d02440131939fe73f6e6ae161ffb98cb1e8e1f11
SH256 hash:
1283d98e247dd24386d22eee19058208f8109a1d8c4544d8a419f45a43571f40
MD5 hash:
4a5cb40a6c38670996b1f554fdad7373
SHA1 hash:
9a528a29debcc2644d00b0a696cdfcab722e0de9
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
32ecbb31b795b66ace206da2ca93e22f05a002d070ba5a5965bf89c0c91beb82
MD5 hash:
be891367a9a7f020097506d3e964bd08
SHA1 hash:
4ae27f5a2ec7c7aa26ca725d79397e4645c807c6
SH256 hash:
9d703fbecf024f3b8e9203cd7ea205884a654716b364de9f3c0c1defeeb6fa5d
MD5 hash:
87ed1e02ff52ddf2332426aa63cd4323
SHA1 hash:
3566885e38fbcf52408de0809a7deeb0580ef363
SH256 hash:
48dcd9dd2293c0eb836460916be8bcf08d20191e1af9851ff5bc75b7344eb905
MD5 hash:
2db518688116cdd0bf10081244f4dc66
SHA1 hash:
26f13e8c836ed665440547a5053583a4d20185cf
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
a5c695ffa629b9aefaf90e14d8c301a6ede988f9c99c30c14bb90963ae7bc346
MD5 hash:
a635145200446261c74ed683358ada96
SHA1 hash:
ca370024e9860e4dc34fbd6b3a6f67e8c4e23d5c
SH256 hash:
0edfac6be11732ddd99db66821ee47408c2dc1e9bed68e5ef9a8e130c565b79b
MD5 hash:
cbd6029abaa8e977d3b7435c6f70dd0e
SHA1 hash:
ebb89d4d7659ef77b658a86ad00dba0ead869f4c
SH256 hash:
9a9a50f91b2ae885d01b95069442f1e220c2a2a8d01e8f7c9747378b4a8f5cfc
MD5 hash:
957460132c11b2b5ea57964138453b00
SHA1 hash:
12e46d4c46feff30071bf8b0b6e13eabba22237f
SH256 hash:
bc6b3ff6906b7533d532e0b96bcce91b93b46853c4e54f97b51f7286cb0b5437
MD5 hash:
f15b695742396eec4511a622c415d0b6
SHA1 hash:
5727454414070318b5f0db19ffa6e0e07d34c1c4
SH256 hash:
d2c6b8cd9fdfad1509e0e717b4f5f01b4c501472e9fd5be90ee3f2bb3d53c9ed
MD5 hash:
b3fef5cf4d29d8ecc51bad9dba5e9551
SHA1 hash:
81093db52686ca6b45b2b91e4eab1a9ad4d9c908
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
ef805962600294d78b3d3de13debc0761a9980ee22e33b7861b1fb9a17ce61e9
MD5 hash:
7e97ea2e66297bb46c1570067c39edba
SHA1 hash:
0d8e64782ef12c9d8303220926808374598726c7
SH256 hash:
d81346f93489b53badb10a26e3f9974f6e796d397e1d2152cef07fa7cf00902d
MD5 hash:
6e24023e67d89b6fb63fb1c9c3fcf4f6
SHA1 hash:
2df608639bb2e9362077c27e6fa93142edb56f20
SH256 hash:
03c55161a6ab7565ac9afb4e9ba2972a5b43ebc1e4c8640c526650fd99d445fe
MD5 hash:
acb10d1d47f7dc5c6916105bd3840ff6
SHA1 hash:
843c4a0dc0c09e4a6c2207dda6376f32e1d290c0
SH256 hash:
cc03001bc0a55b5ae872d210e94470745edb6d9465a87ea276a414c16ae6080a
MD5 hash:
85e6adb9c023cc3547303dafc074cf7a
SHA1 hash:
4c5608d652cf9514c750ecc12f77a09ab4122f43
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments