MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d9f399cddadbf694ad95f21ee60a3599a8f2d48a7165e1b7f495f60cc7a9ae44. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: d9f399cddadbf694ad95f21ee60a3599a8f2d48a7165e1b7f495f60cc7a9ae44
SHA3-384 hash: 3ac118ad5db0606266576df13d004710f5cc23e325abf082abfa1c8b68383caa9ef93c96ffb2615e4d93e42a5789223d
SHA1 hash: 13e71dadf7a2827cdf7b87092988d13ba6555e37
MD5 hash: c502f58a8eedaa99ba437385f760fe1a
humanhash: butter-mountain-fish-carbon
File name:c502f58a8eedaa99ba437385f760fe1a.exe
Download: download sample
Signature RecordBreaker
File size:729'600 bytes
First seen:2023-11-10 14:06:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 12288:1MrMy90fd3yH92fG29IUwuF2Q4Gobot/vPQ2v8/dklxw3NW4oYNapRQ2+p:1yUcdI9IqU3GoElvj0/enw3N/dp
Threatray 2'640 similar samples on MalwareBazaar
TLSH T1B1F41212EBD40133D8B127306CFA03930B3ABCA39D744B272B962D9B5CB2544A67577B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe recordbreaker


Avatar
abuse_ch
RecordBreaker C2:
5.42.92.51:19057

Intelligence


File Origin
# of uploads :
1
# of downloads :
336
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Running batch commands
Creating a window
Connecting to a non-recommended domain
Sending an HTTP POST request
Unauthorized injection to a system process
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer greyware installer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, Mystic Stealer, Raccoon Steale
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DNS related to crypt mining pools
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the hosts file
Multi AV Scanner detection for dropped file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected Glupteba
Yara detected Mystic Stealer
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1340667 Sample: 5KAuN5LJp8.exe Startdate: 10/11/2023 Architecture: WINDOWS Score: 100 138 installsoftwin64.com 2->138 140 host-host-file8.com 2->140 142 3 other IPs or domains 2->142 178 Snort IDS alert for network traffic 2->178 180 Found malware configuration 2->180 182 Malicious sample detected (through community Yara rule) 2->182 184 19 other signatures 2->184 15 5KAuN5LJp8.exe 1 4 2->15         started        18 TrustedInstaller.exe 2->18         started        20 svchost.exe 2->20         started        signatures3 process4 file5 134 C:\Users\user\AppData\Local\...\ok9ar93.exe, PE32 15->134 dropped 136 C:\Users\user\AppData\Local\...\7DP2PF23.exe, PE32 15->136 dropped 22 ok9ar93.exe 1 4 15->22         started        process6 file7 118 C:\Users\user\AppData\Local\...\TN0Xn45.exe, PE32 22->118 dropped 120 C:\Users\user\AppData\Local\...\6Ck8OG0.exe, PE32 22->120 dropped 216 Antivirus detection for dropped file 22->216 218 Machine Learning detection for dropped file 22->218 26 TN0Xn45.exe 1 4 22->26         started        30 6Ck8OG0.exe 1 22->30         started        signatures8 process9 file10 122 C:\Users\user\AppData\Local\...\2uF8244.exe, PE32 26->122 dropped 124 C:\Users\user\AppData\Local\...\1GU88Xb7.exe, PE32 26->124 dropped 220 Antivirus detection for dropped file 26->220 222 Machine Learning detection for dropped file 26->222 32 2uF8244.exe 26->32         started        35 1GU88Xb7.exe 1 26->35         started        224 Multi AV Scanner detection for dropped file 30->224 226 Writes to foreign memory regions 30->226 228 Allocates memory in foreign processes 30->228 230 Injects a PE file into a foreign processes 30->230 37 AppLaunch.exe 8 4 30->37         started        40 conhost.exe 30->40         started        signatures11 process12 dnsIp13 160 Antivirus detection for dropped file 32->160 162 Multi AV Scanner detection for dropped file 32->162 164 Machine Learning detection for dropped file 32->164 176 4 other signatures 32->176 42 explorer.exe 51 13 32->42 injected 166 Contains functionality to inject code into remote processes 35->166 168 Writes to foreign memory regions 35->168 170 Allocates memory in foreign processes 35->170 172 Injects a PE file into a foreign processes 35->172 47 AppLaunch.exe 12 35->47         started        49 conhost.exe 35->49         started        144 5.42.92.51, 19057, 49705 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 37->144 174 Found many strings related to Crypto-Wallets (likely being stolen) 37->174 signatures14 process15 dnsIp16 152 185.229.66.214 SUPERSERVERSDATACENTERRU Russian Federation 42->152 154 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 42->154 158 6 other IPs or domains 42->158 126 C:\Users\user\AppData\Roaming\fwbtiuv, PE32 42->126 dropped 128 C:\Users\user\AppData\Local\Temp\AC58.exe, PE32 42->128 dropped 130 C:\Users\user\AppData\Local\Temp\8854.exe, PE32 42->130 dropped 132 3 other malicious files 42->132 dropped 232 System process connects to network (likely due to code injection or exploit) 42->232 234 Benign windows process drops PE files 42->234 236 Adds a directory exclusion to Windows Defender 42->236 238 Hides that the sample has been downloaded from the Internet (zone.identifier) 42->238 51 AC58.exe 42->51         started        55 73EF.exe 42->55         started        57 81DB.exe 42->57         started        60 5 other processes 42->60 156 193.233.255.73, 49704, 80 FREE-NET-ASFREEnetEU Russian Federation 47->156 240 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 47->240 242 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 47->242 file17 signatures18 process19 dnsIp20 100 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 51->100 dropped 102 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 51->102 dropped 104 C:\Users\user\AppData\...\InstallSetup5.exe, PE32 51->104 dropped 106 C:\...\31839b57a4f11171d6abc8bbc4451ee4.exe, PE32 51->106 dropped 196 Antivirus detection for dropped file 51->196 198 Multi AV Scanner detection for dropped file 51->198 200 Machine Learning detection for dropped file 51->200 202 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 51->202 62 toolspub2.exe 51->62         started        65 31839b57a4f11171d6abc8bbc4451ee4.exe 51->65         started        67 latestX.exe 51->67         started        79 3 other processes 51->79 108 C:\Users\user\...\wHHlvHMKSxDgHJr.data, PE32 55->108 dropped 110 C:\Users\user\...\IcErrSdADZMYCDa.data, PE32 55->110 dropped 204 Writes to foreign memory regions 55->204 206 Allocates memory in foreign processes 55->206 208 Injects a PE file into a foreign processes 55->208 70 jsc.exe 55->70         started        148 176.123.9.142 ALEXHOSTMD Moldova Republic of 57->148 210 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 57->210 212 Found many strings related to Crypto-Wallets (likely being stolen) 57->212 214 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 57->214 73 conhost.exe 57->73         started        150 194.49.94.11 EQUEST-ASNL unknown 60->150 75 conhost.exe 60->75         started        77 conhost.exe 60->77         started        81 3 other processes 60->81 file21 signatures22 process23 dnsIp24 244 Multi AV Scanner detection for dropped file 62->244 246 Detected unpacking (changes PE section rights) 62->246 248 Machine Learning detection for dropped file 62->248 250 Injects a PE file into a foreign processes 62->250 83 toolspub2.exe 62->83         started        252 Detected unpacking (overwrites its own PE header) 65->252 254 Found Tor onion address 65->254 256 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 65->256 86 cmd.exe 65->86         started        112 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 67->112 dropped 114 C:\Windows\System32\drivers\etc\hosts, ASCII 67->114 dropped 258 Modifies the hosts file 67->258 260 Adds a directory exclusion to Windows Defender 67->260 146 194.169.175.235 CLOUDCOMPUTINGDE Germany 70->146 262 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 70->262 264 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 70->264 266 Tries to harvest and steal browser information (history, passwords, etc) 70->266 116 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 79->116 dropped 88 Broom.exe 79->88         started        file25 signatures26 process27 signatures28 186 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 83->186 188 Maps a DLL or memory area into another process 83->188 190 Checks if the current machine is a virtual machine (disk enumeration) 83->190 192 Creates a thread in another existing process (thread injection) 83->192 90 fodhelper.exe 86->90         started        92 conhost.exe 86->92         started        94 fodhelper.exe 86->94         started        96 fodhelper.exe 86->96         started        194 Multi AV Scanner detection for dropped file 88->194 process29 process30 98 31839b57a4f11171d6abc8bbc4451ee4.exe 90->98         started       
Threat name:
Win32.Trojan.Stealerc
Status:
Malicious
First seen:
2023-11-10 15:08:16 UTC
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:mystic family:redline family:sectoprat family:smokeloader botnet:pixelnew2.0 botnet:taiga backdoor infostealer persistence rat stealer trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Downloads MZ/PE file
Detect Mystic stealer payload
Mystic
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SmokeLoader
Malware Config
C2 Extraction:
http://5.42.92.190/fks/index.php
5.42.92.51:19057
194.49.94.11:80
Unpacked files
SH256 hash:
dce3cf0613756df0f955e85e7a91e42edea3c911f9296ee2a63884cf610057f9
MD5 hash:
c99705d89f2e422d524894b639a99ae8
SHA1 hash:
cd0b7fb89195019caf40104b5b723fdbb9343088
SH256 hash:
9304a6abca082dcafd7bc407b3c1def84adabe809935594d5b9f82bd5aab4a6b
MD5 hash:
b2848e921d6f2297721b73d86ffcde7d
SHA1 hash:
33686ed8a23b58c002edaf2ecb48cad62ae21749
SH256 hash:
2294b8fd5a8f2fe92b70326d7c077833e77cd1e6db7bf6bdd882bd3db8483ff3
MD5 hash:
2472c24bb8b47ee1a5229eb6017784f6
SHA1 hash:
fcfecce3cf0a18f98e0352f5ac93bd2a091400a4
SH256 hash:
d9f399cddadbf694ad95f21ee60a3599a8f2d48a7165e1b7f495f60cc7a9ae44
MD5 hash:
c502f58a8eedaa99ba437385f760fe1a
SHA1 hash:
13e71dadf7a2827cdf7b87092988d13ba6555e37
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_redline_wextract_hunting_oct_2023
Author:Matthew @ Embee_Research
Description:Detects wextract archives related to redline/amadey

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RecordBreaker

Executable exe d9f399cddadbf694ad95f21ee60a3599a8f2d48a7165e1b7f495f60cc7a9ae44

(this sample)

  
Delivery method
Distributed via web download

Comments