MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d626b63e65618c3912e53028484168dc213f2bf7cc5b1576bc02817d00724c2d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 1 File information Comments

SHA256 hash: d626b63e65618c3912e53028484168dc213f2bf7cc5b1576bc02817d00724c2d
SHA3-384 hash: 4168cb4ba36bed1713634fc31f086d00b50b93a0b1cd5f09c9a963eb91bba32f8f2140ba593edf610cc8bdf383379f34
SHA1 hash: 80476ca6f5edc43102e1d3f57f0fbb51cab000d4
MD5 hash: 004b18c66d7b92eeaeeb6a5f5a6412e2
humanhash: sixteen-gee-early-fruit
File name:D626B63E65618C3912E53028484168DC213F2BF7CC5B1.exe
Download: download sample
Signature RedLineStealer
File size:306'176 bytes
First seen:2022-08-23 17:46:20 UTC
Last seen:2022-08-23 18:39:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1a4e3d3d047300d519343d22d03d612c (2 x Loki, 1 x RedLineStealer)
ssdeep 3072:87n4Miogzkfb96qKkX0d90J7l5Xf6aG8HpxSYW7NMliBpCDUHv8axujqN:44f/gfb9JlEdCHVG8JQYq3PHvZuj
TLSH T11C54CF1132E08432E5F31E3058B897614A7BB862AB7C85CF2768163E2F636F19E75357
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 38b078cccacccc43 (123 x Smoke Loader, 83 x Stop, 63 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
37.139.129.226:81

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
37.139.129.226:81 https://threatfox.abuse.ch/ioc/844917/

Intelligence


File Origin
# of uploads :
2
# of downloads :
393
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
D626B63E65618C3912E53028484168DC213F2BF7CC5B1.exe
Verdict:
No threats detected
Analysis date:
2022-08-23 17:49:27 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
PrivateLoader, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Connects to a pastebin service (likely for C&C)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected PrivateLoader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 689050 Sample: D626B63E65618C3912E53028484... Startdate: 23/08/2022 Architecture: WINDOWS Score: 100 95 Snort IDS alert for network traffic 2->95 97 Malicious sample detected (through community Yara rule) 2->97 99 Antivirus detection for URL or domain 2->99 101 19 other signatures 2->101 8 D626B63E65618C3912E53028484168DC213F2BF7CC5B1.exe 4 43 2->8         started        13 PowerControl_Svc.exe 2->13         started        15 PowerControl_Svc.exe 2->15         started        17 WmiPrvSE.exe 2->17         started        process3 dnsIp4 83 212.193.30.115, 49721, 49779, 49783 SPD-NETTR Russian Federation 8->83 85 188.241.58.71, 80 THCPROJECTSRO Romania 8->85 87 12 other IPs or domains 8->87 61 C:\Users\...\ufxnjF5Bp2lhrnyO1dvDHZ5w.exe, PE32 8->61 dropped 63 C:\Users\...\mzoYHIqo12d2onvID4jrz0Cp.exe, PE32 8->63 dropped 65 C:\Users\...\kcukrVK2evMIyjeDUcHAHIvC.exe, PE32 8->65 dropped 67 5 other malicious files 8->67 dropped 111 Detected unpacking (changes PE section rights) 8->111 113 Detected unpacking (overwrites its own PE header) 8->113 115 May check the online IP address of the machine 8->115 117 2 other signatures 8->117 19 kcukrVK2evMIyjeDUcHAHIvC.exe 17 8->19         started        23 mzoYHIqo12d2onvID4jrz0Cp.exe 1 8->23         started        26 GFW1VLS5EMa6r6ORaIQb5pJa.exe 8->26         started        28 4 other processes 8->28 file5 signatures6 process7 dnsIp8 71 163.123.143.4, 49778, 49788, 80 ILIGHT-NETUS Reserved 19->71 73 telegram.org 149.154.167.99, 443, 49777 TELEGRAMRU United Kingdom 19->73 75 ipinfo.io 19->75 55 C:\Users\...\ImGvg8AkQ_oN_sutAh2b6zFR.exe, PE32 19->55 dropped 57 C:\Users\user\AppData\Local\...\WW14[1].exe, PE32 19->57 dropped 59 C:\...\PowerControl_Svc.exe, PE32 19->59 dropped 30 ImGvg8AkQ_oN_sutAh2b6zFR.exe 19->30         started        34 schtasks.exe 19->34         started        36 schtasks.exe 19->36         started        103 Writes to foreign memory regions 23->103 105 Allocates memory in foreign processes 23->105 107 Injects a PE file into a foreign processes 23->107 38 conhost.exe 23->38         started        40 MSBuild.exe 23->40         started        109 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 26->109 77 cutt.ly 104.22.0.232, 443, 49786 CLOUDFLARENETUS United States 28->77 79 162.159.134.233, 443, 49787 CLOUDFLARENETUS United States 28->79 81 cdn.discordapp.com 28->81 42 ik30aC8rbQTVBqd99Nm29gBU.exe 28->42         started        45 conhost.exe 28->45         started        47 conhost.exe 28->47         started        file9 signatures10 process11 dnsIp12 89 ipinfo.io 30->89 119 Antivirus detection for dropped file 30->119 121 May check the online IP address of the machine 30->121 123 Machine Learning detection for dropped file 30->123 125 Tries to harvest and steal browser information (history, passwords, etc) 30->125 49 conhost.exe 34->49         started        51 conhost.exe 36->51         started        91 v.xyzgamev.com 172.67.188.70, 443, 49780, 49791 CLOUDFLARENETUS United States 42->91 93 192.168.2.1 unknown unknown 42->93 69 C:\Users\user\AppData\Local\Temp\db.dll, PE32 42->69 dropped 53 conhost.exe 42->53         started        file13 signatures14 process15
Threat name:
Win32.Trojan.RelineStealer
Status:
Malicious
First seen:
2022-04-28 12:29:46 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
masslogger
Result
Malware family:
privateloader
Score:
  10/10
Tags:
family:privateloader evasion loader main spyware stealer trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Reads user/profile data of web browsers
Modifies Windows Defender Real-time Protection settings
PrivateLoader
Malware Config
C2 Extraction:
http://212.193.30.45/proxies.txt
http://45.144.225.57/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
2.56.59.42
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
Unpacked files
SH256 hash:
8e575d495eee5350c89514a6106abf4e601a9dcebc198b9d38d076ae6b45f835
MD5 hash:
fa975e9ec930e7d4850cce26557bbd98
SHA1 hash:
c97a6f308a6c8c35f57a6c3e3536fb88713947f6
Detections:
win_privateloader_a0 win_privateloader_auto win_privateloader_w0
SH256 hash:
d626b63e65618c3912e53028484168dc213f2bf7cc5b1576bc02817d00724c2d
MD5 hash:
004b18c66d7b92eeaeeb6a5f5a6412e2
SHA1 hash:
80476ca6f5edc43102e1d3f57f0fbb51cab000d4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments