MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da2b47c7c49e973d0ffc33fc55392d4157a089dc6b099d4edd2e7ae59254b42c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 6 File information Comments

SHA256 hash: da2b47c7c49e973d0ffc33fc55392d4157a089dc6b099d4edd2e7ae59254b42c
SHA3-384 hash: 6a38958f7992e40e0f18bd584a9dd9c4a69e3d1b70272f8b6643af722072a7b7eff534e98823534ec632a7620b7ce4ee
SHA1 hash: 51ac4b1e3fce3626cc8f0e6322531f6c7bf2f368
MD5 hash: acd4f1abc20c791d50d011af42ddf59b
humanhash: maine-eighteen-beer-delta
File name:acd4f1abc20c791d50d011af42ddf59b.exe
Download: download sample
Signature RedLineStealer
File size:13'106'555 bytes
First seen:2021-12-03 09:50:28 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 196608:xGLUCgI0c0MqrLgxXa9hSNX5Ep0Jo3KVDKVBWXpIGaoreYSHgcMDeMVS/HGB:xOdgIeMQ7QNp40MIGVBWiGanYSAafQ
Threatray 779 similar samples on MalwareBazaar
TLSH T11AD63343BA53C4FBF182967096A88F782AE2C7E41A470493A7D5E0E51E335F2C175EE4
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
91.243.32.142:16969

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
91.243.32.142:16969 https://threatfox.abuse.ch/ioc/258819/

Intelligence


File Origin
# of uploads :
1
# of downloads :
182
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
acd4f1abc20c791d50d011af42ddf59b.exe
Verdict:
No threats detected
Analysis date:
2021-12-03 09:56:45 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
DNS request
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Behaviour
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Backstage Stealer Metasploit RedLine Smo
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Disables Windows Defender (via service or powershell)
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Backstage Stealer
Yara detected Metasploit Payload
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 533261 Sample: rfmEYZiTI4.exe Startdate: 03/12/2021 Architecture: WINDOWS Score: 100 75 37.230.138.66 ROCKETTELECOM-ASRU Russian Federation 2->75 77 199.192.28.206 NAMECHEAP-NETUS United States 2->77 93 Antivirus detection for dropped file 2->93 95 Multi AV Scanner detection for dropped file 2->95 97 Multi AV Scanner detection for submitted file 2->97 99 15 other signatures 2->99 11 rfmEYZiTI4.exe 36 2->11         started        signatures3 process4 file5 59 C:\Users\user\AppData\...\setup_install.exe, PE32 11->59 dropped 61 C:\Users\user\...\Sat15f3ce4194fd2d.exe, PE32 11->61 dropped 63 C:\Users\user\...\Sat15d108bc494507.exe, PE32 11->63 dropped 65 31 other files (23 malicious) 11->65 dropped 14 setup_install.exe 1 11->14         started        process6 signatures7 131 Adds a directory exclusion to Windows Defender 14->131 133 Disables Windows Defender (via service or powershell) 14->133 17 cmd.exe 14->17         started        19 cmd.exe 1 14->19         started        21 cmd.exe 1 14->21         started        23 13 other processes 14->23 process8 signatures9 26 Sat1596f380811.exe 17->26         started        29 Sat155a5e35d814.exe 19->29         started        31 Sat1516637711.exe 2 21->31         started        101 Adds a directory exclusion to Windows Defender 23->101 103 Disables Windows Defender (via service or powershell) 23->103 33 Sat15b3714a51.exe 23->33         started        36 Sat156998c5f48aac81.exe 23->36         started        39 Sat155deff5c59621aa0.exe 1 23->39         started        41 7 other processes 23->41 process10 dnsIp11 105 Detected unpacking (changes PE section rights) 26->105 107 Machine Learning detection for dropped file 26->107 109 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 26->109 129 3 other signatures 26->129 111 Multi AV Scanner detection for dropped file 29->111 113 Injects a PE file into a foreign processes 29->113 115 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 29->115 43 Sat155a5e35d814.exe 29->43         started        117 Query firmware table information (likely to detect VMs) 31->117 119 Tries to detect sandboxes / dynamic malware analysis system (registry check) 31->119 53 C:\Users\user\AppData\...\Sat15b3714a51.tmp, PE32 33->53 dropped 121 Antivirus detection for dropped file 33->121 123 Obfuscated command line found 33->123 89 2 other IPs or domains 36->89 55 C:\Users\user\AppData\Local\...\LzmwAqmV.exe, PE32 36->55 dropped 79 208.95.112.1 TUT-ASUS United States 39->79 81 8.8.8.8 GOOGLEUS United States 39->81 83 88.218.95.235 ENZUINC-US Netherlands 39->83 125 Tries to harvest and steal browser information (history, passwords, etc) 39->125 85 212.193.30.29 SPD-NETTR Russian Federation 41->85 87 212.193.30.45 SPD-NETTR Russian Federation 41->87 91 3 other IPs or domains 41->91 57 C:\Users\user\AppData\...\Sat15b550e51a55.tmp, PE32 41->57 dropped 127 Creates processes via WMI 41->127 45 Sat15b550e51a55.tmp 41->45         started        48 Sat156630419237d.exe 41->48         started        file12 signatures13 process14 dnsIp15 67 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 45->67 dropped 69 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 45->69 dropped 71 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 45->71 dropped 73 172.67.219.219 CLOUDFLARENETUS United States 48->73 51 conhost.exe 48->51         started        file16 process17
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-11-28 18:00:57 UTC
File Type:
PE (Exe)
Extracted files:
667
AV detection:
35 of 45 (77.78%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:redline family:socelars botnet:media26p aspackv2 evasion infostealer persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Kills process with taskkill
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Adds Run key to start application
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Process spawned unexpected child process
RedLine
RedLine Payload
Socelars
Socelars Payload
Malware Config
C2 Extraction:
http://www.ecgbg.com/
65.108.69.168:16278
Unpacked files
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
1bbf1271ce5c9dc20b595fdf1f516166f65b443599fc835607008666296983ff
MD5 hash:
49fc2ee06ab4c4b533cf9ce484c02adf
SHA1 hash:
b90f22613578232b8bf377377ea5c4d84b37b0a7
Detections:
win_zloader_g1
Parent samples :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 hash:
4feb70ee4d54dd933dfa3a8d0461dc428484489e8a34b905276a799e0bf9220f
MD5 hash:
ed5b2c2bf689ca52e9b53f6bc2195c63
SHA1 hash:
f61d31d176ba67cfff4f0cab04b4b2d19df91684
SH256 hash:
93c4cba30e4e919db036ca03b25885094ff34caf6a52125dc5647c16c454e700
MD5 hash:
f0380d884cef856b846e2128714e63be
SHA1 hash:
a51466452c7ad1b604335cfcf00f6547ba326dfb
SH256 hash:
c041b49989f2654558e2baf33aee4c2a5c52b9bb99f947ad3466df4f263806c0
MD5 hash:
cbc0ea99f0eb922755c8d89c4065213d
SHA1 hash:
ea526a040c9d89014ee77740fd3c201462839831
SH256 hash:
b2fccd725da1a59d1c23fd8840a7177c4de2de5977b8c6b3d0811876860d6e10
MD5 hash:
a2d01bb373574399783de844aa18d4d7
SHA1 hash:
dd3c1e72900637a56c6f63e615305550bfa92aa1
SH256 hash:
8d3bc172b6c668f80756c53d21d67dff19e19f51493355099b6e7831c6155481
MD5 hash:
e69e107bd11924cfe4a2edd9e8213495
SHA1 hash:
af09710a01b3cb7da34c3dbf62dceb66b40a6b32
SH256 hash:
0ad5327842a689881417460e5078d73a6b0fa218ece21cb665cd2975ade6ea1d
MD5 hash:
b7a14e5c4efb276a5e4a1beccfa573f2
SHA1 hash:
ac28067021fc58a0d902b2836d1f6c851b0683ca
SH256 hash:
a87d72ac344954c248dda314b85c81540b6725bb036d58b477e98bc1f0fe027f
MD5 hash:
702902acc9116ea3da57e4d498b25024
SHA1 hash:
9372d42c5e7eb490df72bd9d683c5e00659ba17b
SH256 hash:
646eea2b4e17022c1cb7911b0cef68e058cc21835c3be4da29242ddf98182b49
MD5 hash:
fe83ef41d82529b45dcf0cef116a2df0
SHA1 hash:
8d1daee38437ba003d9913af9bc3abd4afd3e996
SH256 hash:
50b0793f94f90a0838ca5b5df557689504d2f2267379a2a82554de689291c0e8
MD5 hash:
4ed75531191a990b39976edb0bfa0bf7
SHA1 hash:
72f322b9142b186e1910ab227ebb9f71dbe24758
SH256 hash:
a68c714884a600484184a9beed1471567d5c5b4e879c98bde43a88517192c76d
MD5 hash:
852f151b175512e3276b782469a94dad
SHA1 hash:
54322aa82aae01da6922426c2181259942e2b867
SH256 hash:
411ddc47ca1e3b90fa51417a0f4906b6caf27299d489cf286c6bde62b52fe57a
MD5 hash:
ebef736dce8c0824828436f0a7ac8866
SHA1 hash:
52b9d78265b00de1be7626df9e6ab7f03c5a8ddf
SH256 hash:
734f5d593286866d4abef9061e6f0b6a78a7f70f03f32baa6af4aec477565c37
MD5 hash:
ddb0102d9de243f1d988f833a8cfe173
SHA1 hash:
4a0f44a78b79ca304a14111e981294cf7bf6600a
SH256 hash:
b81bad27dea53d48c07d74e814cff8514627bf44a300ffa5d65398e0f9269020
MD5 hash:
6b60de8eb1ad8acde4a76b70beebb9f3
SHA1 hash:
1b583619fdbbf3bb13911e163cad0ae566f1cbbc
SH256 hash:
d04d08dcc992204103589c66cbd629caca7c0b5a41d248a7140b4c19df21256b
MD5 hash:
e6e1e7e67602be64b67dabc0d46b6fcf
SHA1 hash:
5bcf3d7f2ebdb1690bb7b0592e2776076e7b4d47
SH256 hash:
787e496e398018260c1ce25fdc68cdf2ed67fdd613ba138e9c18b6e3cfe8fc60
MD5 hash:
256d30585750bf6cc6733edf67275370
SHA1 hash:
d67727f1f9c90650cbd715042a7c6fe7e5fd322f
SH256 hash:
fc9862b27666220e3fd13eb1ff77256bdf11f882121bd01913bd6d5ac3167867
MD5 hash:
63594ee3921e0ea0e65784d91494909a
SHA1 hash:
485a5fabe393b4a80648e2ee68fbad96fdbf68e5
SH256 hash:
03a3716478173fe27b2e5c6a5c7a85f36ff0ec4d14f98d8b40524e7e568e8d78
MD5 hash:
5f2a8f8f1020ed83c2aa09b8b3e13ca3
SHA1 hash:
17e5e7e347f70375130a4ef613da4e1679a73d0c
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
376bf69f01fe65802f1ec35b8715067687c4bd47937154fc4c3903b06fe89a92
MD5 hash:
feea5b4bc6a46188e7998b53b668d6fe
SHA1 hash:
ff73a76d88ba96baba23acf669ab2fb61e541916
SH256 hash:
9446114690f9df9265728dd795c2166a5c538a072bc94983e66c9f532145df79
MD5 hash:
5d36287f497ff64ba552ba53b5feaa61
SHA1 hash:
1398e94d03f57b8f46860500acb00be3cd96d8aa
SH256 hash:
3dca90af7904cb9eef23228b8f7677c2c119728a3fec4ed9c3bb9d1ca0037ba9
MD5 hash:
92fa75ffcff1d2df138d47c7c27d97ea
SHA1 hash:
3c313a378888ab38dab380baa5b7e280f5e120ef
SH256 hash:
d35f622526032d2763587d780da741a61536d43068e75d7014b89906f9527178
MD5 hash:
dc3545667e414d4312992ee366bcd083
SHA1 hash:
9e2c015ad39f87d4be32d49e6d6d88da4cd86f6c
SH256 hash:
f3c9dc945e209f694f4626438fe57594fe2c0edafe588c0a8fdd707695473c7f
MD5 hash:
fdc6e083c3241f0b82dfebf15570386e
SHA1 hash:
74c1bde231eb712439bb5b5c2581559f5cc69f2c
SH256 hash:
e8776c232bf4e300ac63a2af55dc2ccd2ed0254afbeaef0ba689b0b32cabe61b
MD5 hash:
3966f019eac7d7f0d4d3987064656087
SHA1 hash:
cb5a4b3999d735a2f34f0cf18f2ddeeb558f129d
SH256 hash:
b1ebf4803bfd94a19fd68ea6ec17d47e451ec11d61a3de8eb2964cc5765b87b9
MD5 hash:
34bd6d1253cb8094e9811ed3afdb120e
SHA1 hash:
08b3d8bf1b8d609a286bc8b1a6c5340b87261f33
SH256 hash:
efec730b55762b003d49fe1d182cbebb9436775a846deccec9fde3f89f23eb39
MD5 hash:
37fba385cf6f65db4ae01a81f457dbf5
SHA1 hash:
7ea5a449ed1ee4b0a28d1fa2bad15f0674ea4402
SH256 hash:
df7a52fea7b2e0da38c569f0691591e0aad8303ad102223e061eb08b4d3a42ae
MD5 hash:
16546e8772418a5d6c6cbb794a1450a3
SHA1 hash:
c54956bf9597f7358b0d802c208d6eb6c8883856
SH256 hash:
da2b47c7c49e973d0ffc33fc55392d4157a089dc6b099d4edd2e7ae59254b42c
MD5 hash:
acd4f1abc20c791d50d011af42ddf59b
SHA1 hash:
51ac4b1e3fce3626cc8f0e6322531f6c7bf2f368
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments