MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dbce6bdd247474179db59137515436785eb03193f2ef51244d62b1d5762fd933. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 8 File information Comments

SHA256 hash: dbce6bdd247474179db59137515436785eb03193f2ef51244d62b1d5762fd933
SHA3-384 hash: 9f139d52d45f202c276bc8c1e146e5b5f681ab9f1df1bdcbe3f6258122278a459474f5a2b34ab267db468e354f0209ae
SHA1 hash: 5e040f2eaa3e149e9e0e48ea83a96d1757b33fd2
MD5 hash: 54c65e90d811108be950f37a489ea6fe
humanhash: mockingbird-sierra-ceiling-wisconsin
File name:file
Download: download sample
Signature RedLineStealer
File size:1'494'016 bytes
First seen:2023-10-03 12:20:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:eypkM321g5jPOFwQ4Ts+NMztQMV05hKWGcN1aAID8yuRpPdq5JQPk/9w3Zqw+6Cy:tpki24GFwQcsdQU0TK5cN4nDQRpPdEM7
Threatray 48 similar samples on MalwareBazaar
TLSH T1E96523439FE86026E8B61770E8F607870BB57E506D78C32B2604D45B1CB2A959EB3737
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://77.91.68.249/navi/kur90.exe

Intelligence


File Origin
# of uploads :
1
# of downloads :
302
Origin country :
US US
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a service
Sending a custom TCP request
Creating a file
Launching a process
Сreating synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Gathering data
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Amadey, Babadeda, Fabookie, Healer AV Di
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Fabookie
Yara detected Healer AV Disabler
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1318682 Sample: file.exe Startdate: 03/10/2023 Architecture: WINDOWS Score: 100 130 www3.l.google.com 2->130 132 www.google.com 2->132 134 10 other IPs or domains 2->134 148 Snort IDS alert for network traffic 2->148 150 Multi AV Scanner detection for domain / URL 2->150 152 Found malware configuration 2->152 154 18 other signatures 2->154 15 file.exe 1 4 2->15         started        18 svchost.exe 2->18         started        21 svchost.exe 3 2->21         started        23 11 other processes 2->23 signatures3 process4 file5 126 C:\Users\user\AppData\Local\...\qZ0oP60.exe, PE32 15->126 dropped 128 C:\Users\user\AppData\Local\...\5iQ2IJ7.exe, PE32 15->128 dropped 25 qZ0oP60.exe 1 4 15->25         started        29 Conhost.exe 15->29         started        144 Changes security center settings (notifications, updates, antivirus, firewall) 18->144 146 Query firmware table information (likely to detect VMs) 21->146 31 WerFault.exe 23->31         started        33 WerFault.exe 23->33         started        35 WerFault.exe 23->35         started        signatures6 process7 file8 106 C:\Users\user\AppData\Local\...\Yj1Cc63.exe, PE32 25->106 dropped 108 C:\Users\user\AppData\Local\...\4Eq789Og.exe, PE32 25->108 dropped 174 Multi AV Scanner detection for dropped file 25->174 37 Yj1Cc63.exe 1 4 25->37         started        signatures9 process10 file11 98 C:\Users\user\AppData\Local\...\zZ4Lp23.exe, PE32 37->98 dropped 100 C:\Users\user\AppData\Local\...\3FZ90Hc.exe, PE32 37->100 dropped 40 3FZ90Hc.exe 37->40         started        43 zZ4Lp23.exe 1 4 37->43         started        process12 file13 168 Writes to foreign memory regions 40->168 170 Allocates memory in foreign processes 40->170 172 Injects a PE file into a foreign processes 40->172 46 AppLaunch.exe 40->46         started        49 conhost.exe 40->49         started        51 WerFault.exe 40->51         started        122 C:\Users\user\AppData\Local\...\2vK2667.exe, PE32 43->122 dropped 124 C:\Users\user\AppData\Local\...\1hi22Qx2.exe, PE32 43->124 dropped 53 1hi22Qx2.exe 9 1 43->53         started        55 2vK2667.exe 1 43->55         started        signatures14 process15 signatures16 184 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 46->184 186 Maps a DLL or memory area into another process 46->186 188 Checks if the current machine is a virtual machine (disk enumeration) 46->188 190 Creates a thread in another existing process (thread injection) 46->190 57 explorer.exe 46->57 injected 192 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 53->192 194 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 53->194 196 Modifies windows update settings 53->196 206 2 other signatures 53->206 198 Contains functionality to inject code into remote processes 55->198 200 Writes to foreign memory regions 55->200 202 Allocates memory in foreign processes 55->202 204 Injects a PE file into a foreign processes 55->204 62 AppLaunch.exe 13 55->62         started        64 WerFault.exe 23 9 55->64         started        66 conhost.exe 55->66         started        process17 dnsIp18 136 185.106.94.250, 49830, 80 SUPERSERVERSDATACENTERRU Russian Federation 57->136 138 5.42.65.80, 49763, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 57->138 142 4 other IPs or domains 57->142 110 C:\Users\user\AppData\Roaming\djfibju, PE32 57->110 dropped 112 C:\Users\user\AppData\Local\Temp89.exe, PE32 57->112 dropped 114 C:\Users\user\AppData\Local\Temp54.exe, PE32 57->114 dropped 116 7 other malicious files 57->116 dropped 176 System process connects to network (likely due to code injection or exploit) 57->176 178 Benign windows process drops PE files 57->178 180 Hides that the sample has been downloaded from the Internet (zone.identifier) 57->180 68 4F5A.exe 57->68         started        72 4266.exe 57->72         started        140 5.42.92.211, 49717, 49724, 80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 62->140 file19 signatures20 process21 file22 90 C:\Users\user\AppData\Local\...\mg1NF8HJ.exe, PE32 68->90 dropped 92 C:\Users\user\AppData\Local\...\6IL51Jf.exe, PE32 68->92 dropped 156 Antivirus detection for dropped file 68->156 158 Multi AV Scanner detection for dropped file 68->158 160 Machine Learning detection for dropped file 68->160 74 mg1NF8HJ.exe 68->74         started        162 Writes to foreign memory regions 72->162 164 Allocates memory in foreign processes 72->164 166 Injects a PE file into a foreign processes 72->166 78 conhost.exe 72->78         started        80 AppLaunch.exe 72->80         started        82 Conhost.exe 72->82         started        signatures23 process24 file25 118 C:\Users\user\AppData\Local\...\nq4At6bb.exe, PE32 74->118 dropped 120 C:\Users\user\AppData\Local\...\5ol27ts.exe, PE32 74->120 dropped 182 Multi AV Scanner detection for dropped file 74->182 84 nq4At6bb.exe 74->84         started        signatures26 process27 file28 94 C:\Users\user\AppData\Local\...\aB0DF7Wt.exe, PE32 84->94 dropped 96 C:\Users\user\AppData\Local\...\4Bk271fw.exe, PE32 84->96 dropped 87 aB0DF7Wt.exe 84->87         started        process29 file30 102 C:\Users\user\AppData\Local\...\cp6iF4Il.exe, PE32 87->102 dropped 104 C:\Users\user\AppData\Local\...\3xU2uD18.exe, PE32 87->104 dropped
Threat name:
ByteCode-MSIL.Trojan.Plugx
Status:
Malicious
First seen:
2023-10-03 12:21:07 UTC
File Type:
PE (Exe)
Extracted files:
155
AV detection:
17 of 23 (73.91%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:dcrat family:glupteba family:healer family:mystic family:redline family:smokeloader botnet:@ytlogsbot botnet:gigant botnet:jordan botnet:up3 backdoor discovery dropper evasion infostealer loader persistence rat rootkit spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Manipulates WinMonFS driver.
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Windows security modification
Downloads MZ/PE file
Modifies Windows Firewall
Amadey
DcRat
Detects Healer an antivirus disabler dropper
Glupteba
Glupteba payload
Healer
Modifies Windows Defender Real-time Protection settings
Mystic
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
77.91.124.55:19071
http://77.91.68.29/fks/
http://77.91.124.1/theme/index.php
176.123.4.46:33783
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
4e0e4660d283270ae7abac2520b0bbd19324ff879c079ddb771c072bc7bbf60e
MD5 hash:
9550b6022fcadfa9c2b6ed54f716b5eb
SHA1 hash:
0f2056f10af352f7c96cd0be0ab10538688512c2
SH256 hash:
22d7cd4307d0d25ec5ca750cb5af440b2a8425e3b20468d45640b9aadf70e95a
MD5 hash:
552e054360847418d760e4c94fa3ef1d
SHA1 hash:
91b612d5c0f98fad4e8a24863e425d1f3aa3291c
SH256 hash:
46aed74a3cfe6275e5c53be2b0628c03d1a1796148179c4dc7b88405110b6ba6
MD5 hash:
3894df6ec290bd3f66685c27ba9b3876
SHA1 hash:
45732df43efebce0db6d21e2350c2d3248400f14
SH256 hash:
dbce6bdd247474179db59137515436785eb03193f2ef51244d62b1d5762fd933
MD5 hash:
54c65e90d811108be950f37a489ea6fe
SHA1 hash:
5e040f2eaa3e149e9e0e48ea83a96d1757b33fd2
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments