MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cc2d611eb3f0e462f0c136b1664348fc05669fbac46ebb4b28c900c4dff94318. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 14
| SHA256 hash: | cc2d611eb3f0e462f0c136b1664348fc05669fbac46ebb4b28c900c4dff94318 |
|---|---|
| SHA3-384 hash: | 83d1e0ca05acc7485e7bd536255c96d28c7dd9bccf5f3acf3d3e1c1fea9f8f4a10da7cac343b20d700dcf13d0a7c964c |
| SHA1 hash: | 4c67c4a9b13880d68a324b646d58523b7d7c66b2 |
| MD5 hash: | ad763d76409ed44f9cfb8b2ed65499e5 |
| humanhash: | hawaii-coffee-burger-hamper |
| File name: | ad763d76409ed44f9cfb8b2ed65499e5.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 6'588'086 bytes |
| First seen: | 2021-12-26 15:36:30 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer) |
| ssdeep | 196608:xtDibfaogIhU47j0qLyvjVxHp58LqMx9Le0/8KMPP:xtWrFz7jTevjVxJ5iqMLeNKMH |
| TLSH | T18A66332139F5E4F7FB564131664C2FFA25B4C64CDF10E91B0391A2585AB8FB6A40BC2E |
| File icon (PE): | |
| dhash icon | 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 185.215.113.85:13374 | https://threatfox.abuse.ch/ioc/287794/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
306
Origin country :
n/a
Vendor Threat Intelligence
Detection:
Vidar
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Creating a window
Searching for synchronization primitives
Creating a file
Creating a process with a hidden window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
barys lockbit overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Socelars
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2021-12-24 03:05:00 UTC
File Type:
PE (Exe)
Extracted files:
276
AV detection:
23 of 28 (82.14%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Result
Malware family:
vidar
Score:
10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:915 botnet:media24pns botnet:userv1 aspackv2 backdoor infostealer persistence spyware stealer trojan
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
65.108.69.168:13293
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
159.69.246.184:13127
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
65.108.69.168:13293
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
159.69.246.184:13127
Unpacked files
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
12f682423118581850910cddfb42e2ebb2851e4ec5c346c041f71a1dda51c057
MD5 hash:
029e5130789f584309502d7e23d6b3ec
SHA1 hash:
93f64300d51f9dbd6119c6aa4fdebecb44372758
SH256 hash:
722bcd5017181f2b1e2b162104d7d63a9ffa37fc0e49e1a6d4bc1b5132a27086
MD5 hash:
6b66a269ed9e31b54e2ed0a1c5b993a0
SHA1 hash:
b80b7930a4beb0727634e79da2b2f928a06c84c9
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
f94a49f7e9098caec29318488c6ee905bcfb2a5bf6e987305e03576b0da5c595
MD5 hash:
294856fef3e5664d6c4ab77bbdd1f4d2
SHA1 hash:
255d454b5dd344ea29e92e0f0f0ba6908790a6a8
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
3b8e282d52f07e91a123775276bdc594483f8b17f3bde37eaf3db65f36c8bd62
MD5 hash:
46000ac1c9f5068137bfc667b6f844ba
SHA1 hash:
5313468335effe686b7cfe5b6db39eeb20b18008
SH256 hash:
7e5f99ff9ac50aa0e9f56cde0c5624031aa0122a0d2316c1691e46a7600f533f
MD5 hash:
b2c9b6785b3b3a462e352f69163cfdde
SHA1 hash:
a8a9e17bb3cc253dd513960087a6256a8e1d1e7d
SH256 hash:
fb910936734ddb240212f0734b428ed4f1e8aa881ae64d5297763c0c73e8ae58
MD5 hash:
de48206ce34f5c848a68514d05087ad2
SHA1 hash:
6464d96e86bb1f5f7bd25c0069933557036171fb
SH256 hash:
8f41ef85a06c5b253fc58d60de184464827033f0c55345fd6b7a93883c21bafb
MD5 hash:
e8214789a814cc7c43ce64102b71993f
SHA1 hash:
97de207f91fbbe842748cd5490225c0989526785
SH256 hash:
c2df032736263cc39ef2e63ad72537a1731a7995749483461f2a4200142c966a
MD5 hash:
8ba0ca24f11f4a9182a88606e68b52a0
SHA1 hash:
9138bcb0e1484378b2a46dfe378472a788227f49
SH256 hash:
933540ad99801f044555a23cca60004bc03e8a15409eef1161ff7fcdf06caa46
MD5 hash:
cd6a21e42d1cb52afce0435b6ee64d65
SHA1 hash:
1def0813c7c0ff73370b253ff9a9bf17a56ed140
SH256 hash:
cc2d611eb3f0e462f0c136b1664348fc05669fbac46ebb4b28c900c4dff94318
MD5 hash:
ad763d76409ed44f9cfb8b2ed65499e5
SHA1 hash:
4c67c4a9b13880d68a324b646d58523b7d7c66b2
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.