MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dd14e54d550a3bbdbc1bc67553c5b3963a4b3007240b5bfc45bd3bfcf3356fd7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 2 YARA File information Comments

SHA256 hash: dd14e54d550a3bbdbc1bc67553c5b3963a4b3007240b5bfc45bd3bfcf3356fd7
SHA3-384 hash: e1eb8860e75b3365f4e579adb75543d1b23497a9fd20dd9c4f1a55be232a05c852f8e86ee5fa6a61a8524f0aa26df336
SHA1 hash: bc556bdb576a2d7973ba61589fb10582be2a4098
MD5 hash: 6206ad0b97ce8e35d5651e615b3b3048
humanhash: red-oregon-solar-failed
File name:6206ad0b97ce8e35d5651e615b3b3048.exe
Download: download sample
Signature RedLineStealer
File size:343'552 bytes
First seen:2022-05-11 02:47:01 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d9d95fd58a88cd9dff2eb6f1f682782c (2 x RedLineStealer)
ssdeep 3072:F8jHT7zFK0oCBJS/szMKe0n1pLUJ4/Qw3M2a2mGzTRFsxkgaBCh:kHT7xKAJuslei15q4zLWYTAiga
Threatray 4'649 similar samples on MalwareBazaar
TLSH T1AA74DF02B6D0D830D1E38E305870D7A94A7FB88216B5544BF7B87F6F2EB13916AB1356
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 5c59da3ce0c1c850 (36 x Stop, 33 x Smoke Loader, 26 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
89.22.234.87:29285

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
89.22.234.87:29285 https://threatfox.abuse.ch/ioc/549453/
103.133.111.182:39219 https://threatfox.abuse.ch/ioc/549454/

Intelligence


File Origin
# of uploads :
1
# of downloads :
269
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
socelars
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2022-05-08 01:03:30 UTC
Tags:
evasion trojan socelars stealer loader opendir rat redline miner ransomware stop tofsee hiloti

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Djvu, Nymaim, RedLine, SmokeLoader, Tofs
Detection:
malicious
Classification:
rans.troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Downloads files with wrong headers with respect to MIME Content-Type
Drops PE files to the document folder of the user
Found C&C like URL pattern
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AntiVM3
Yara detected Djvu Ransomware
Yara detected Generic Downloader
Yara detected MSILDownloaderGeneric
Yara detected Nymaim
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 624088 Sample: hdk8Z67C7x.exe Startdate: 11/05/2022 Architecture: WINDOWS Score: 100 51 premiumfilehosting.com 188.72.236.239, 443, 49850, 49857 WEBZILLANL Netherlands 2->51 53 162.159.134.233, 443, 49829, 49830 CLOUDFLARENETUS United States 2->53 55 5 other IPs or domains 2->55 77 Snort IDS alert for network traffic 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 Antivirus detection for URL or domain 2->81 83 29 other signatures 2->83 7 hdk8Z67C7x.exe 4 74 2->7         started        12 svchost.exe 2->12         started        14 svchost.exe 2->14         started        16 6 other processes 2->16 signatures3 process4 dnsIp5 69 212.193.30.21, 49736, 49748, 49807 SPD-NETTR Russian Federation 7->69 71 212.193.30.45, 49733, 49806, 49827 SPD-NETTR Russian Federation 7->71 75 12 other IPs or domains 7->75 43 C:\Users\...\zbTziOgq8wXhLzvQmMtKEJdw.exe, PE32 7->43 dropped 45 C:\Users\...\rUpv_DgKgEww6186LczpiB2r.exe, PE32 7->45 dropped 47 C:\Users\...\m_OV9GOM1jCh1co3JVIwaHAC.exe, PE32 7->47 dropped 49 28 other files (22 malicious) 7->49 dropped 95 May check the online IP address of the machine 7->95 97 Creates HTML files with .exe extension (expired dropper behavior) 7->97 99 Disable Windows Defender real time protection (registry) 7->99 18 zbTziOgq8wXhLzvQmMtKEJdw.exe 17 7->18         started        22 iUyNo5Lm30lsdiLxzEM1taf6.exe 7->22         started        25 U5bxbAWfmhlP1roCTemONkwW.exe 7->25         started        27 11 other processes 7->27 101 Changes security center settings (notifications, updates, antivirus, firewall) 12->101 73 127.0.0.1 unknown unknown 14->73 file6 signatures7 process8 dnsIp9 57 t.me 149.154.167.99, 443, 49805, 49826 TELEGRAMRU United Kingdom 18->57 59 telegram.org 18->59 61 ipinfo.io 18->61 29 C:\Users\...\8Kr_abJBqi2MLlwqkXtaUizN.exe, PE32 18->29 dropped 31 C:\Users\user\AppData\Local\...\WW14[1].bmp, PE32 18->31 dropped 33 C:\...\PowerControl_Svc.exe, PE32 18->33 dropped 85 Sample uses process hollowing technique 22->85 87 Injects a PE file into a foreign processes 22->87 89 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 25->89 91 Checks if the current machine is a virtual machine (disk enumeration) 25->91 63 195.201.44.81, 49837, 80 HETZNER-ASDE Germany 27->63 65 memorial.asvp.org.br 186.202.153.98, 443, 49825 LocawebServicosdeInternetSABR Brazil 27->65 67 2 other IPs or domains 27->67 35 C:\Users\user\AppData\Local\...\qjrychtl.exe, PE32 27->35 dropped 37 C:\Users\...\pidHTSIGEi8DrAmaYu9K8ghN89.dll, PE32+ 27->37 dropped 39 C:\ProgramData\vcruntime140.dll, PE32 27->39 dropped 41 5 other files (none is malicious) 27->41 dropped 93 Tries to harvest and steal browser information (history, passwords, etc) 27->93 file10 signatures11
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2022-05-06 15:42:51 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
25 of 26 (96.15%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
evasion spyware stealer suricata trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Modifies Windows Defender Real-time Protection settings
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
Unpacked files
SH256 hash:
8e575d495eee5350c89514a6106abf4e601a9dcebc198b9d38d076ae6b45f835
MD5 hash:
fa975e9ec930e7d4850cce26557bbd98
SHA1 hash:
c97a6f308a6c8c35f57a6c3e3536fb88713947f6
SH256 hash:
dd14e54d550a3bbdbc1bc67553c5b3963a4b3007240b5bfc45bd3bfcf3356fd7
MD5 hash:
6206ad0b97ce8e35d5651e615b3b3048
SHA1 hash:
bc556bdb576a2d7973ba61589fb10582be2a4098
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments