MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cc2d611eb3f0e462f0c136b1664348fc05669fbac46ebb4b28c900c4dff94318. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA File information Comments

SHA256 hash: cc2d611eb3f0e462f0c136b1664348fc05669fbac46ebb4b28c900c4dff94318
SHA3-384 hash: 83d1e0ca05acc7485e7bd536255c96d28c7dd9bccf5f3acf3d3e1c1fea9f8f4a10da7cac343b20d700dcf13d0a7c964c
SHA1 hash: 4c67c4a9b13880d68a324b646d58523b7d7c66b2
MD5 hash: ad763d76409ed44f9cfb8b2ed65499e5
humanhash: hawaii-coffee-burger-hamper
File name:ad763d76409ed44f9cfb8b2ed65499e5.exe
Download: download sample
Signature RedLineStealer
File size:6'588'086 bytes
First seen:2021-12-26 15:36:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 196608:xtDibfaogIhU47j0qLyvjVxHp58LqMx9Le0/8KMPP:xtWrFz7jTevjVxJ5iqMLeNKMH
TLSH T18A66332139F5E4F7FB564131664C2FFA25B4C64CDF10E91B0391A2585AB8FB6A40BC2E
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.215.113.85:13374

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.85:13374 https://threatfox.abuse.ch/ioc/287794/

Intelligence


File Origin
# of uploads :
1
# of downloads :
306
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Launching a process
Creating a window
Searching for synchronization primitives
Creating a file
Creating a process with a hidden window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys lockbit overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine SmokeLoader Socelars Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Sample uses process hollowing technique
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 545438 Sample: HqOcQxewKw.exe Startdate: 26/12/2021 Architecture: WINDOWS Score: 100 78 104.208.16.94 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->78 80 185.212.129.29 INTERNET-ITNL Germany 2->80 82 2 other IPs or domains 2->82 108 Multi AV Scanner detection for domain / URL 2->108 110 Antivirus detection for URL or domain 2->110 112 Antivirus detection for dropped file 2->112 114 18 other signatures 2->114 10 HqOcQxewKw.exe 24 2->10         started        13 WmiPrvSE.exe 2->13         started        signatures3 process4 file5 48 C:\Users\user\AppData\...\setup_install.exe, PE32 10->48 dropped 50 C:\Users\user\AppData\...\Thu11fc58bc54.exe, PE32 10->50 dropped 52 C:\Users\user\AppData\...\Thu11db26fe3a1.exe, PE32 10->52 dropped 54 18 other files (8 malicious) 10->54 dropped 15 setup_install.exe 1 10->15         started        process6 dnsIp7 98 104.21.92.33 CLOUDFLARENETUS United States 15->98 100 127.0.0.1 unknown unknown 15->100 102 192.168.2.1 unknown unknown 15->102 104 Adds a directory exclusion to Windows Defender 15->104 106 Disables Windows Defender (via service or powershell) 15->106 19 cmd.exe 15->19         started        21 cmd.exe 15->21         started        23 cmd.exe 1 15->23         started        26 15 other processes 15->26 signatures8 process9 signatures10 28 Thu11c668614fd663.exe 19->28         started        33 Thu112a7360c8b.exe 21->33         started        116 Adds a directory exclusion to Windows Defender 23->116 118 Disables Windows Defender (via service or powershell) 23->118 35 powershell.exe 11 23->35         started        37 Thu11c4d5223f5.exe 26->37         started        39 Thu11bb8ff185f.exe 26->39         started        41 Thu11fc58bc54.exe 26->41         started        43 10 other processes 26->43 process11 dnsIp12 84 185.215.113.208 WHOLESALECONNECTIONSNL Portugal 28->84 86 185.112.83.8 SUPERSERVERSDATACENTERRU Russian Federation 28->86 92 9 other IPs or domains 28->92 56 C:\Users\...\Y4ovHH9SxUIrMeE4IZuEnND4.exe, PE32+ 28->56 dropped 58 C:\Users\user\AppData\Local\...\SFold1[1].exe, PE32 28->58 dropped 60 C:\Users\user\...60iceProcessX64[1].bmp, PE32+ 28->60 dropped 68 29 other files (6 malicious) 28->68 dropped 120 Creates HTML files with .exe extension (expired dropper behavior) 28->120 122 Tries to harvest and steal browser information (history, passwords, etc) 28->122 124 Disable Windows Defender real time protection (registry) 28->124 94 2 other IPs or domains 33->94 70 12 other files (none is malicious) 33->70 dropped 126 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 33->126 128 Machine Learning detection for dropped file 33->128 130 Tries to steal Crypto Currency Wallets 33->130 132 Sample uses process hollowing technique 37->132 134 Injects a PE file into a foreign processes 37->134 136 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 41->136 138 Checks if the current machine is a virtual machine (disk enumeration) 41->138 88 208.95.112.1 TUT-ASUS United States 43->88 90 212.193.30.45 SPD-NETTR Russian Federation 43->90 96 7 other IPs or domains 43->96 62 C:\Users\user\AppData\...\Thu11c4a8f1b4.tmp, PE32 43->62 dropped 64 C:\Users\user\AppData\Local\Temp\11111.exe, PE32 43->64 dropped 66 37f7b1c2-a332-4ab1-b71e-c06b4aae89e3.exe, PE32 43->66 dropped 72 4 other files (none is malicious) 43->72 dropped 140 Detected unpacking (overwrites its own PE header) 43->140 142 Obfuscated command line found 43->142 45 Thu11c4a8f1b4.tmp 43->45         started        file13 signatures14 process15 file16 74 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 45->74 dropped 76 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 45->76 dropped
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2021-12-24 03:05:00 UTC
File Type:
PE (Exe)
Extracted files:
276
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:915 botnet:media24pns botnet:userv1 aspackv2 backdoor infostealer persistence spyware stealer trojan
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
NirSoft WebBrowserPassView
Nirsoft
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://www.biohazardgraphics.com/
https://mstdn.social/@kipriauk9
https://qoto.org/@kipriauk8
65.108.69.168:13293
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
159.69.246.184:13127
Unpacked files
SH256 hash:
4f7016fb630595204b4cb47d03f4cdf9a75597d2586fa9bbd244a0407a567748
MD5 hash:
ec94b9dbbb8502ae096f9d7e1f33901c
SHA1 hash:
d5f73eaaa6df419e83bb2c58f30d28ba2e348b72
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
12f682423118581850910cddfb42e2ebb2851e4ec5c346c041f71a1dda51c057
MD5 hash:
029e5130789f584309502d7e23d6b3ec
SHA1 hash:
93f64300d51f9dbd6119c6aa4fdebecb44372758
SH256 hash:
722bcd5017181f2b1e2b162104d7d63a9ffa37fc0e49e1a6d4bc1b5132a27086
MD5 hash:
6b66a269ed9e31b54e2ed0a1c5b993a0
SHA1 hash:
b80b7930a4beb0727634e79da2b2f928a06c84c9
SH256 hash:
a5cb08b5c9d66e3751795d06b6a15ccfe0f5c30519cd151ca46ba550696714d8
MD5 hash:
457ebf3cd64e9e5ee17e15b9ee7d3d52
SHA1 hash:
bd9ff2e210432a80635d8e777c40d39a150dbfa1
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
f94a49f7e9098caec29318488c6ee905bcfb2a5bf6e987305e03576b0da5c595
MD5 hash:
294856fef3e5664d6c4ab77bbdd1f4d2
SHA1 hash:
255d454b5dd344ea29e92e0f0f0ba6908790a6a8
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
3b8e282d52f07e91a123775276bdc594483f8b17f3bde37eaf3db65f36c8bd62
MD5 hash:
46000ac1c9f5068137bfc667b6f844ba
SHA1 hash:
5313468335effe686b7cfe5b6db39eeb20b18008
SH256 hash:
7e5f99ff9ac50aa0e9f56cde0c5624031aa0122a0d2316c1691e46a7600f533f
MD5 hash:
b2c9b6785b3b3a462e352f69163cfdde
SHA1 hash:
a8a9e17bb3cc253dd513960087a6256a8e1d1e7d
SH256 hash:
fb910936734ddb240212f0734b428ed4f1e8aa881ae64d5297763c0c73e8ae58
MD5 hash:
de48206ce34f5c848a68514d05087ad2
SHA1 hash:
6464d96e86bb1f5f7bd25c0069933557036171fb
SH256 hash:
8f41ef85a06c5b253fc58d60de184464827033f0c55345fd6b7a93883c21bafb
MD5 hash:
e8214789a814cc7c43ce64102b71993f
SHA1 hash:
97de207f91fbbe842748cd5490225c0989526785
SH256 hash:
c2df032736263cc39ef2e63ad72537a1731a7995749483461f2a4200142c966a
MD5 hash:
8ba0ca24f11f4a9182a88606e68b52a0
SHA1 hash:
9138bcb0e1484378b2a46dfe378472a788227f49
SH256 hash:
933540ad99801f044555a23cca60004bc03e8a15409eef1161ff7fcdf06caa46
MD5 hash:
cd6a21e42d1cb52afce0435b6ee64d65
SHA1 hash:
1def0813c7c0ff73370b253ff9a9bf17a56ed140
SH256 hash:
cc2d611eb3f0e462f0c136b1664348fc05669fbac46ebb4b28c900c4dff94318
MD5 hash:
ad763d76409ed44f9cfb8b2ed65499e5
SHA1 hash:
4c67c4a9b13880d68a324b646d58523b7d7c66b2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments