MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da19103e927e19daedc51212deb60ceca403e3e9876c52a9dec41d7e6215929b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 7 File information Comments

SHA256 hash: da19103e927e19daedc51212deb60ceca403e3e9876c52a9dec41d7e6215929b
SHA3-384 hash: a2badc93dc8a1dab7da25625c72809e8c34fcdb1b6863000b2ebfd67b53e63c404b9cc80821e76773f219d248320726c
SHA1 hash: a38b24b80f4f5daf9ecc072454a0726fac16895b
MD5 hash: 4eb4d3032677a3545eea108428f87d0f
humanhash: seven-nuts-rugby-april
File name:4EB4D3032677A3545EEA108428F87D0F.exe
Download: download sample
Signature RedLineStealer
File size:3'222'826 bytes
First seen:2021-05-31 21:46:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 49152:UbA305mWHSGE4SfYLZgCF37tD/8siDztKxOR3fu6QDm5hUkMU/4Nkn3zb3Njjap7:UbVrFSfQLNIDpKx04DUUmqCZGDF4npO
Threatray 753 similar samples on MalwareBazaar
TLSH A6E52301BEC16872D672183159799B21687FBC241F18CEAB93F42B5DDA351C0EB31FA6
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
162.55.55.250:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
162.55.55.250:80 https://threatfox.abuse.ch/ioc/67974/

Intelligence


File Origin
# of uploads :
1
# of downloads :
178
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4EB4D3032677A3545EEA108428F87D0F.exe
Verdict:
Malicious activity
Analysis date:
2021-05-31 21:49:20 UTC
Tags:
evasion trojan autoit rat redline phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Launching a process
Creating a file in the %temp% subdirectories
Sending a UDP request
Creating a file
DNS request
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Sending an HTTP GET request
Creating a process with a hidden window
Reading critical registry keys
Deleting a recently created file
Creating a file in the %AppData% directory
Delayed reading of the file
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Modifying a system file
Replacing files
Using the Windows Management Instrumentation requests
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Sending an HTTP POST request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected VMProtect packer
DLL reload attack detected
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 427278 Sample: GEYq8uRSMS.exe Startdate: 31/05/2021 Architecture: WINDOWS Score: 100 112 13.88.21.125 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 2->112 148 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->148 150 Found malware configuration 2->150 152 Multi AV Scanner detection for submitted file 2->152 154 10 other signatures 2->154 10 GEYq8uRSMS.exe 1 12 2->10         started        13 iexplore.exe 88 2->13         started        signatures3 process4 file5 104 C:\Users\user\Desktop\pub2.exe, PE32 10->104 dropped 106 C:\Users\user\Desktop\pzyh.exe, PE32 10->106 dropped 108 C:\Users\user\Desktop\jg3_3uag.exe, PE32 10->108 dropped 110 3 other files (none is malicious) 10->110 dropped 15 KRSetp.exe 15 8 10->15         started        19 Folder.exe 10->19         started        21 pub2.exe 10->21         started        28 3 other processes 10->28 24 iexplore.exe 13->24         started        26 iexplore.exe 13->26         started        process6 dnsIp7 130 172.67.145.48 CLOUDFLARENETUS United States 15->130 68 C:\Users\user\AppData\Roaming\7687016.exe, PE32 15->68 dropped 70 C:\Users\user\AppData\Roaming\1301325.exe, PE32 15->70 dropped 72 C:\Users\user\AppData\Roaming\3778845.exe, PE32 15->72 dropped 74 C:\Users\user\AppData\Roaming\1641414.exe, PE32 15->74 dropped 30 7687016.exe 15->30         started        34 1301325.exe 15->34         started        47 2 other processes 15->47 76 C:\Users\user\AppData\Local\...\install.dll, PE32 19->76 dropped 37 rundll32.exe 19->37         started        39 conhost.exe 19->39         started        78 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 21->78 dropped 172 DLL reload attack detected 21->172 174 Detected unpacking (changes PE section rights) 21->174 176 Renames NTDLL to bypass HIPS 21->176 178 3 other signatures 21->178 41 explorer.exe 21->41 injected 132 iplogger.org 24->132 134 ip-api.com 208.95.112.1, 49720, 80 TUT-ASUS United States 28->134 136 star-mini.c10r.facebook.com 185.60.216.35, 443, 49723 FACEBOOKUS Ireland 28->136 138 3 other IPs or domains 28->138 80 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 28->80 dropped 82 C:\Users\user\AppData\Local\Temp\...\File.exe, PE32 28->82 dropped 84 C:\Users\user\AppData\Local\...\jg3_3uag.exe, PE32 28->84 dropped 43 jg3_3uag.exe 19 28->43         started        45 File.exe 28->45         started        49 4 other processes 28->49 file8 signatures9 process10 dnsIp11 118 217.107.34.191 RTCOMM-ASRU Russian Federation 30->118 180 Sample uses process hollowing technique 30->180 182 Injects a PE file into a foreign processes 30->182 51 AddInProcess32.exe 30->51         started        90 C:\Users\user\AppData\...\WinHoster.exe, PE32 34->90 dropped 184 Detected unpacking (changes PE section rights) 34->184 55 WinHoster.exe 34->55         started        186 Writes to foreign memory regions 37->186 188 Allocates memory in foreign processes 37->188 190 Creates a thread in another existing process (thread injection) 37->190 57 svchost.exe 37->57 injected 59 svchost.exe 37->59 injected 92 C:\Users\user\AppData\Roaming\rwediuw, PE32 41->92 dropped 192 Benign windows process drops PE files 41->192 194 Hides that the sample has been downloaded from the Internet (zone.identifier) 41->194 61 WinHoster.exe 41->61         started        120 101.36.107.74, 49714, 80 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 43->120 122 iplogger.org 88.99.66.31, 443, 49716, 49717 HETZNER-ASDE Germany 43->122 94 C:\Users\user\Documents\...\jg3_3uag.exe, PE32 43->94 dropped 196 Antivirus detection for dropped file 43->196 198 Drops PE files to the document folder of the user 43->198 200 Machine Learning detection for dropped file 43->200 202 Tries to harvest and steal browser information (history, passwords, etc) 43->202 124 188.120.255.239, 49721, 80 THEFIRST-ASRU Russian Federation 45->124 204 Binary is likely a compiled AutoIt script file 45->204 126 172.67.163.99 CLOUDFLARENETUS United States 47->126 128 172.67.186.78 CLOUDFLARENETUS United States 47->128 96 C:\ProgramData\48\vcruntime140.dll, PE32 47->96 dropped 98 C:\ProgramData\48\sqlite3.dll, PE32 47->98 dropped 100 C:\ProgramData\48\softokn3.dll, PE32 47->100 dropped 102 11 other files (none is malicious) 47->102 dropped file12 signatures13 process14 dnsIp15 114 104.26.12.31 CLOUDFLARENETUS United States 51->114 116 162.55.55.250 ACPCA United States 51->116 156 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 51->156 158 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 51->158 160 Tries to harvest and steal browser information (history, passwords, etc) 51->160 162 Tries to steal Crypto Currency Wallets 51->162 164 Detected unpacking (changes PE section rights) 55->164 166 System process connects to network (likely due to code injection or exploit) 57->166 168 Sets debug register (to hijack the execution of another thread) 57->168 170 Modifies the context of a thread in another process (thread injection) 57->170 63 svchost.exe 57->63         started        signatures16 process17 dnsIp18 140 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 63->140 142 172.67.200.215 CLOUDFLARENETUS United States 63->142 86 C:\Users\user\AppData\...\Login Data.tmp, SQLite 63->86 dropped 88 C:\Users\user\AppData\Local\...\Cookies.tmp, SQLite 63->88 dropped 144 Query firmware table information (likely to detect VMs) 63->144 146 Tries to harvest and steal browser information (history, passwords, etc) 63->146 file19 signatures20
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2021-05-29 11:20:49 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader family:vidar botnet:8 backdoor bootkit discovery evasion infostealer persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
autoit_exe
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Writes to the Master Boot Record (MBR)
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://20xbtc.com/upload/
http://yzsnw.com/upload/
http://kaledebiyat.com/upload/
http://expertizizmir.com/upload/
http://dedkndy.com/upload/
http://theuncu.com/upload/
wimuawzice.xyz:80
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_HyperPro03
Author:ditekSHen
Description:Hunt HyperPro IronTiger / LuckyMouse / APT27 malware
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments