MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ccfa8b97f8273be6e7fee1beb2330cc45ab8f152c5d1bfa8b04f7b3b0b603433. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA 3 File information Comments 1

SHA256 hash: ccfa8b97f8273be6e7fee1beb2330cc45ab8f152c5d1bfa8b04f7b3b0b603433
SHA3-384 hash: 1598b5f7cf7af29635c94c8632e8c2b57be32f2404c9ffb55015e3370ad33fa2d39958695565af1ace783c84408eb6f9
SHA1 hash: fc22d595a95d1f72772fff26e7b2659a131a491d
MD5 hash: 7814d10ccac316da7b3616a9f4334590
humanhash: cola-avocado-fanta-stairway
File name:7814d10ccac316da7b3616a9f4334590
Download: download sample
Signature RedLineStealer
File size:611'232 bytes
First seen:2021-09-05 09:50:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash caa5e6a2892587c2324418efee31c648 (9 x RedLineStealer, 1 x RemoteManipulator, 1 x RaccoonStealer)
ssdeep 12288:r7iuUvUF2JIU2VbPwiBlCOkkAU5WJk8d9:r7iuUvDTiBlCAvUjd9
Threatray 5'646 similar samples on MalwareBazaar
TLSH T194D49EC723251711FB3C0A30E69D15E93F214DEE9C59C8E670F8BA1ABDC51212A5BAF1
dhash icon b2bab28e96babeaa (1 x RedLineStealer)
Reporter zbetcheckin
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
7814d10ccac316da7b3616a9f4334590
Verdict:
No threats detected
Analysis date:
2021-09-05 09:51:15 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Sending an HTTP GET request
Creating a file
Creating a file in the %AppData% directory
Sending a UDP request
Creating a process from a recently created file
Searching for analyzing tools
Searching for the window
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Launching a process
Stealing user critical data
Unauthorized injection to a recently created process
Result
Threat name:
Raccoon RedLine SectopRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Binary or sample is protected by dotNetProtector
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample or dropped binary is a compiled AutoHotkey binary
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SectopRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 477935 Sample: AMxo8mW9BE Startdate: 05/09/2021 Architecture: WINDOWS Score: 100 43 clientconfig.passport.net 2->43 83 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->83 85 Found malware configuration 2->85 87 Multi AV Scanner detection for submitted file 2->87 89 8 other signatures 2->89 9 AMxo8mW9BE.exe 14 2->9         started        signatures3 process4 dnsIp5 57 iplogger.org 88.99.66.31, 443, 49703, 49723 HETZNER-ASDE Germany 9->57 59 is.gd 104.25.233.53, 443, 49704 CLOUDFLARENETUS United States 9->59 61 4 other IPs or domains 9->61 33 C:\Users\user\AppData\Roaming\32.exe, PE32 9->33 dropped 99 Detected unpacking (changes PE section rights) 9->99 101 Sample or dropped binary is a compiled AutoHotkey binary 9->101 14 32.exe 15 49 9->14         started        file6 signatures7 process8 dnsIp9 69 demner.site 80.66.87.32, 26062, 49711 WORLDSTREAMNL Russian Federation 14->69 71 eholot.reklarta.com 51.178.232.167, 443, 49718 OVHFR France 14->71 73 6 other IPs or domains 14->73 37 C:\Users\user\AppData\Local\Temp\srvs.exe, PE32 14->37 dropped 39 C:\Users\user\AppData\Local\Temp\srrvs.exe, PE32 14->39 dropped 41 C:\Users\user\AppData\Local\...\32.exe.log, ASCII 14->41 dropped 75 Detected unpacking (changes PE section rights) 14->75 77 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->77 79 Query firmware table information (likely to detect VMs) 14->79 81 6 other signatures 14->81 19 srvs.exe 14 2 14->19         started        23 srrvs.exe 14->23         started        25 chrome.exe 15 386 14->25         started        27 conhost.exe 14->27         started        file10 signatures11 process12 dnsIp13 45 www.google.com 172.217.168.68, 49739, 80 GOOGLEUS United States 19->45 47 google.com 216.58.215.238, 49738, 80 GOOGLEUS United States 19->47 91 Multi AV Scanner detection for dropped file 19->91 93 Tries to delay execution (extensive OutputDebugStringW loop) 19->93 95 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 19->95 49 77.232.36.56, 228, 49745 EUT-ASEUTIPNetworkRU Russian Federation 23->49 97 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 23->97 51 192.168.2.1 unknown unknown 25->51 53 192.168.2.3 unknown unknown 25->53 55 2 other IPs or domains 25->55 29 chrome.exe 16 25->29         started        signatures14 process15 dnsIp16 63 clients.l.google.com 142.250.203.110, 443, 49720, 52931 GOOGLEUS United States 29->63 65 googlehosted.l.googleusercontent.com 142.250.203.97, 443, 49744 GOOGLEUS United States 29->65 67 5 other IPs or domains 29->67 35 C:\Users\user\AppData\Local\...\Cookies, SQLite 29->35 dropped file17
Threat name:
Win64.Trojan.Bingoml
Status:
Malicious
First seen:
2021-09-01 00:46:22 UTC
AV detection:
12 of 27 (44.44%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
discovery evasion spyware stealer suricata themida trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Checks BIOS information in registry
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
Unpacked files
SH256 hash:
ccfa8b97f8273be6e7fee1beb2330cc45ab8f152c5d1bfa8b04f7b3b0b603433
MD5 hash:
7814d10ccac316da7b3616a9f4334590
SHA1 hash:
fc22d595a95d1f72772fff26e7b2659a131a491d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_MPress
Author:ditekSHen
Description:Detects executables built or packed with MPress PE compressor
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe ccfa8b97f8273be6e7fee1beb2330cc45ab8f152c5d1bfa8b04f7b3b0b603433

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-05 09:50:23 UTC

url : hxxp://installlcube.ru/faster4upusa.exe