MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 12 File information Comments

SHA256 hash: cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c
SHA3-384 hash: bcf8e73492323b99756570b1ee246f41930d140ed81262f1112eaced9111954d93f9b4af0fbd9853cbe361c1ff383e6a
SHA1 hash: 3420d976f980b963fec140739f0eaef07c7333e3
MD5 hash: d1906fd8d9e6b18ee8a134e81982e23a
humanhash: speaker-wyoming-video-angel
File name:d1906fd8d9e6b18ee8a134e81982e23a.exe
Download: download sample
Signature RedLineStealer
File size:1'036'288 bytes
First seen:2023-10-01 17:35:14 UTC
Last seen:2023-10-01 19:32:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c1026f3bc4dbd1c7779566798486c792 (3 x LummaStealer, 2 x RedLineStealer, 1 x Smoke Loader)
ssdeep 24576:4s9rN9YwPzIFbDslb50xVwJF5Jq9HnyKLW2U08U/7zgesADyI:t9rNWwbeP9wsnC0Z70esADyI
Threatray 5'762 similar samples on MalwareBazaar
TLSH T1D025EF966218242AD3D51B70C962F6720655BD3CA9E0980FF6FD7E1B7FFE583E011A02
TrID 28.5% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
13.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
12.2% (.EXE) Win32 Executable (generic) (4505/5/1)
5.6% (.EXE) Win16/32 Executable Delphi generic (2072/23)
File icon (PE):PE icon
dhash icon b2b2b27169d4c0d0 (2 x RedLineStealer, 1 x Stealc, 1 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.58.147.147:39834

Intelligence


File Origin
# of uploads :
2
# of downloads :
323
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Launching a process
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Forced shutdown of a system process
Stealing user critical data
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Unauthorized injection to a system process
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control greyware lolbin packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1317601 Sample: OaJjqAJFcN.exe Startdate: 01/10/2023 Architecture: WINDOWS Score: 100 49 akmedia.in 2->49 55 Snort IDS alert for network traffic 2->55 57 Multi AV Scanner detection for domain / URL 2->57 59 Found malware configuration 2->59 61 9 other signatures 2->61 11 OaJjqAJFcN.exe 13 2->11         started        14 efjebvg 4 2->14         started        16 efjebvg 4 2->16         started        signatures3 process4 signatures5 93 Maps a DLL or memory area into another process 11->93 95 Sample uses process hollowing technique 11->95 97 Contains functionality to detect sleep reduction / modifications 11->97 18 RegAsm.exe 15 6 11->18         started        99 Multi AV Scanner detection for dropped file 14->99 101 Detected unpacking (changes PE section rights) 14->101 103 Machine Learning detection for dropped file 14->103 23 efjebvg 14->23         started        105 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->105 25 efjebvg 16->25         started        process6 dnsIp7 51 193.58.147.147, 39834, 49797 RACKMARKTES Spain 18->51 53 162.244.93.4, 49798, 80 PONYNETUS United States 18->53 45 C:\Users\user\AppData\Local\Temp\svhost.exe, PE32 18->45 dropped 71 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->71 73 Found many strings related to Crypto-Wallets (likely being stolen) 18->73 75 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->75 83 3 other signatures 18->83 27 svhost.exe 4 18->27         started        77 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->77 79 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 23->79 81 Maps a DLL or memory area into another process 23->81 85 2 other signatures 23->85 file8 signatures9 process10 signatures11 107 Multi AV Scanner detection for dropped file 27->107 109 Detected unpacking (changes PE section rights) 27->109 111 Machine Learning detection for dropped file 27->111 113 2 other signatures 27->113 30 svhost.exe 27->30         started        process12 signatures13 115 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 30->115 117 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 30->117 119 Maps a DLL or memory area into another process 30->119 121 3 other signatures 30->121 33 explorer.exe 5 3 30->33 injected process14 dnsIp15 47 akmedia.in 192.185.150.20, 49802, 49808, 49809 UNIFIEDLAYER-AS-1US United States 33->47 43 C:\Users\user\AppData\Roaming\efjebvg, PE32 33->43 dropped 63 System process connects to network (likely due to code injection or exploit) 33->63 65 Benign windows process drops PE files 33->65 67 Injects code into the Windows Explorer (explorer.exe) 33->67 69 2 other signatures 33->69 38 explorer.exe 24 33->38         started        41 explorer.exe 33->41         started        file16 signatures17 process18 signatures19 87 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 38->87 89 Tries to steal Mail credentials (via file / registry access) 38->89 91 Tries to harvest and steal browser information (history, passwords, etc) 38->91
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2023-10-01 17:36:05 UTC
File Type:
PE (Exe)
Extracted files:
44
AV detection:
16 of 23 (69.57%)
Threat level:
  2/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:redline family:smokeloader botnet:edward botnet:rlol backdoor collection discovery infostealer spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
RedLine
SmokeLoader
Malware Config
C2 Extraction:
193.58.147.147:39834
http://akmedia.in/js/k/index.php
http://bethesdaserukam.org/setting/k/index.php
http://stemschools.in/js/k/index.php
http://dejarestaurant.com/wp-admin/js/k/index.php
http://moabscript.ir/wp-admin/js/k/index.php
http://nicehybridseeds.com/image/catalog/k/index.php
http://imaker.io/picktail/js/k/index.php
http://nanavatisworld.com/assets/js/k/index.php
http://smartbubox.com/img/k/index.php
http://krigenpharmaceuticals.com/js/k/index.php
Unpacked files
SH256 hash:
dbeb2028a1f6b16cee9b201127cf14348233ecc027f421a8fe9f35e551921ee6
MD5 hash:
2a6f17ff3f01c17c715f93ef81dab82e
SHA1 hash:
255765383a7e94bd6d5d86c3a133e91e4674d9d6
SH256 hash:
ce0eb0dbcb1aa190d17f4a599dba607d11808bc696cd2eff3231a1ef0fe4530b
MD5 hash:
3908eaa52a13d60108aed79c085f00be
SHA1 hash:
4943cd5b9a7cf9901a755d39bc2289a7ae42d751
SH256 hash:
cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c
MD5 hash:
d1906fd8d9e6b18ee8a134e81982e23a
SHA1 hash:
3420d976f980b963fec140739f0eaef07c7333e3
Malware family:
RedLine.E
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:SEH__vba
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe cef823e614c07e8813c9e32db81d8dc6a20d00a3e55aca97a6a5c340aa6e5d1c

(this sample)

  
Delivery method
Distributed via web download

Comments