MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 dc677c6443110908471abea7adb0b40cb199520d29ada8a56873e9247cb80dc8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | dc677c6443110908471abea7adb0b40cb199520d29ada8a56873e9247cb80dc8 |
|---|---|
| SHA3-384 hash: | bd88c21132218b9ac05d85a481c58374d78d65a2cb245c2c277c1f90eb7cac0c79ddf31e9adb49d1a3c7410e7df54cae |
| SHA1 hash: | 07e78079f94dd55dc3e97efe4eec1488b679e84b |
| MD5 hash: | ac3ae60b82a4cf7355e815e1977eda23 |
| humanhash: | virginia-triple-zebra-sweet |
| File name: | ac3ae60b82a4cf7355e815e1977eda23.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 358'912 bytes |
| First seen: | 2023-04-15 12:50:09 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 40cd8d3e41cd5908e2d82cb9558e77b9 (2 x Smoke Loader, 2 x Vidar, 1 x Tofsee) |
| ssdeep | 6144:Mxx+ZMwK90rcYJW9DvusQd//zk4w2hNTi:Mx8ZBe0rhJWNxa7k+hs |
| Threatray | 4'282 similar samples on MalwareBazaar |
| TLSH | T137743A02D3A1BC70E516A7798E1ED6F4775EB5208F19FBEB26494A2F09F42E1C232714 |
| TrID | 39.5% (.EXE) InstallShield setup (43053/19/16) 28.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 9.6% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | 0165260b23090603 (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
264
Origin country :
NLVendor Threat Intelligence
Malware family:
smoke
ID:
1
File name:
ac3ae60b82a4cf7355e815e1977eda23.exe
Verdict:
Malicious activity
Analysis date:
2023-04-15 12:50:46 UTC
Tags:
installer loader smoke trojan
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
SmokeLoader
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Searching for synchronization primitives
Reading critical registry keys
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Sending an HTTP POST request
Sending a custom TCP request
Creating a process from a recently created file
Query of malicious DNS domain
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
greyware mokes packed
Verdict:
Malicious
Labled as:
Win/malicious_confidence_100%
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RHADAMANTHYS, RedLine, SmokeLoader
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to infect the boot sector
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found potential ransomware demand text
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected RHADAMANTHYS Stealer
Yara detected SmokeLoader
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2023-04-15 06:57:26 UTC
File Type:
PE (Exe)
Extracted files:
76
AV detection:
19 of 24 (79.17%)
Threat level:
2/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 4'272 additional samples on MalwareBazaar
Result
Malware family:
smokeloader
Score:
10/10
Tags:
family:rhadamanthys family:smokeloader botnet:pub4 backdoor collection stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
outlook_office_path
outlook_win_path
Program crash
Accesses Microsoft Outlook profiles
Executes dropped EXE
Downloads MZ/PE file
Detect rhadamanthys stealer shellcode
Rhadamanthys
SmokeLoader
Malware Config
C2 Extraction:
http://aapu.at/tmp/
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://179.43.142.201/img/favicon.png
http://poudineh.com/tmp/
http://firsttrusteedrx.ru/tmp/
http://kingpirate.ru/tmp/
http://179.43.142.201/img/favicon.png
Unpacked files
SH256 hash:
8d425e3a777589dc02bb08b9819d78478b14055dd9eebc67dc9caea5ddef1c6d
MD5 hash:
10bffe181eeb6feb30b4fbb0e7c7077c
SHA1 hash:
20a7946348367cdb9e50ef304310924904726843
Detections:
SmokeLoaderStage2
win_smokeloader_a2
Parent samples :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 hash:
dc677c6443110908471abea7adb0b40cb199520d29ada8a56873e9247cb80dc8
MD5 hash:
ac3ae60b82a4cf7355e815e1977eda23
SHA1 hash:
07e78079f94dd55dc3e97efe4eec1488b679e84b
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.