MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df26b54b984ae1b94fecde99e7b0513a305164f9000929d3467a95d16e33667d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA File information Comments

SHA256 hash: df26b54b984ae1b94fecde99e7b0513a305164f9000929d3467a95d16e33667d
SHA3-384 hash: 3c3539e6eac970b8f371397ec272b5fee41ab01240df605d1c05cdfa045a6255ffc62ea86c823ebcd696137be8b07d0e
SHA1 hash: b3de7a40c3586fe45ba1cd4e8929760d8a697250
MD5 hash: e0fe9226cd6652b14cc47ee7f35ae1d6
humanhash: mississippi-table-avocado-emma
File name:DF26B54B984AE1B94FECDE99E7B0513A305164F900092.exe
Download: download sample
Signature RedLineStealer
File size:2'641'656 bytes
First seen:2022-05-31 11:16:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 49152:Eggt2r//R4txaNwsAyAPKN5tPvFZaMXp45MHkBUXW9wUu4nTf/yw:JXmxa8yAPGtlJpfHGYXnYXT
TLSH T105C5333675E8DCF3E7B565B12C5A12A94CC81F0A401CC22E7E11BAC6EE23879ED45BD1
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
87.251.77.50:36425

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
87.251.77.50:36425 https://threatfox.abuse.ch/ioc/643613/

Intelligence


File Origin
# of uploads :
1
# of downloads :
292
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
DF26B54B984AE1B94FECDE99E7B0513A305164F900092.exe
Verdict:
No threats detected
Analysis date:
2022-05-31 11:24:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Moving a recently created file
Running batch commands
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
barys control.exe glupteba overlay packed shell32.dll upatre
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Djvu, Nymaim, RedLine, Vidar
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
DLL reload attack detected
Drops PE files to the document folder of the user
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected Djvu Ransomware
Yara detected Generic Downloader
Yara detected MSILDownloaderGeneric
Yara detected Nymaim
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 636684 Sample: DF26B54B984AE1B94FECDE99E7B... Startdate: 31/05/2022 Architecture: WINDOWS Score: 100 85 s.lletlee.com 2->85 87 google.vrthcobj.com 2->87 89 16 other IPs or domains 2->89 137 Snort IDS alert for network traffic 2->137 139 Malicious sample detected (through community Yara rule) 2->139 141 Antivirus detection for URL or domain 2->141 149 19 other signatures 2->149 12 DF26B54B984AE1B94FECDE99E7B0513A305164F900092.exe 10 2->12         started        signatures3 143 System process connects to network (likely due to code injection or exploit) 85->143 145 May check the online IP address of the machine 85->145 147 Performs DNS queries to domains with low reputation 87->147 process4 file5 69 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->69 dropped 15 setup_installer.exe 15 12->15         started        process6 file7 77 C:\Users\user\AppData\...\setup_install.exe, PE32 15->77 dropped 79 C:\Users\user\AppData\Local\...\sahiba_7.txt, PE32+ 15->79 dropped 81 C:\Users\user\AppData\Local\...\sahiba_6.txt, PE32 15->81 dropped 83 10 other files (5 malicious) 15->83 dropped 18 setup_install.exe 1 15->18         started        process8 dnsIp9 91 razino.xyz 192.64.119.193, 49771, 80 NAMECHEAP-NETUS United States 18->91 93 127.0.0.1 unknown unknown 18->93 95 s.lletlee.com 18->95 61 C:\Users\user~1\...\sahiba_7.exe (copy), PE32+ 18->61 dropped 63 C:\Users\user~1\...\sahiba_6.exe (copy), PE32 18->63 dropped 65 C:\Users\user~1\...\sahiba_5.exe (copy), PE32 18->65 dropped 67 4 other malicious files 18->67 dropped 151 Antivirus detection for dropped file 18->151 153 Detected unpacking (changes PE section rights) 18->153 155 Performs DNS queries to domains with low reputation 18->155 157 Machine Learning detection for dropped file 18->157 23 cmd.exe 18->23         started        25 cmd.exe 1 18->25         started        27 cmd.exe 1 18->27         started        29 5 other processes 18->29 file10 signatures11 process12 process13 31 sahiba_6.exe 23->31         started        36 sahiba_2.exe 1 25->36         started        38 sahiba_3.exe 45 27->38         started        40 sahiba_5.exe 29->40         started        42 sahiba_1.exe 2 29->42         started        44 sahiba_4.exe 14 2 29->44         started        dnsIp14 97 212.193.30.21, 49779, 80 SPD-NETTR Russian Federation 31->97 99 193.106.191.222, 49785, 80 BOSPOR-ASRU Russian Federation 31->99 103 13 other IPs or domains 31->103 51 C:\Users\...\uTTXcyTbSumaIsubyNNOstKU.exe, PE32 31->51 dropped 53 C:\Users\...\si7ZLoH1ZF_6h_JfIBAWYkCX.exe, PE32 31->53 dropped 55 C:\Users\...\k697gakitkj1o5AEJzSLn6Or.exe, PE32 31->55 dropped 59 26 other files (24 malicious) 31->59 dropped 111 Drops PE files to the document folder of the user 31->111 113 May check the online IP address of the machine 31->113 115 Creates HTML files with .exe extension (expired dropper behavior) 31->115 117 Disable Windows Defender real time protection (registry) 31->117 57 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 36->57 dropped 119 DLL reload attack detected 36->119 121 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 36->121 135 3 other signatures 36->135 101 116.202.183.50, 80 HETZNER-ASDE Germany 38->101 105 3 other IPs or domains 38->105 123 Detected unpacking (changes PE section rights) 38->123 125 Detected unpacking (overwrites its own PE header) 38->125 127 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 38->127 129 Tries to harvest and steal browser information (history, passwords, etc) 38->129 107 3 other IPs or domains 40->107 131 Performs DNS queries to domains with low reputation 40->131 133 Creates processes via WMI 42->133 46 sahiba_1.exe 42->46         started        109 2 other IPs or domains 44->109 file15 signatures16 process17 file18 71 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 46->71 dropped 73 C:\...\api-ms-win-core-string-l1-1-0.dll, PE32 46->73 dropped 75 C:\...\api-ms-win-core-namedpipe-l1-1-0.dll, PE32 46->75 dropped 49 conhost.exe 46->49         started        process19
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2021-07-20 15:36:51 UTC
File Type:
PE (Exe)
Extracted files:
101
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:vidar botnet:933 aspackv2 evasion stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
ASPack v2.12-2.42
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
suricata: ET MALWARE Win32/Spy.Socelars.S CnC Activity M3
Malware Config
C2 Extraction:
https://shpak125.tumblr.com/
Unpacked files
SH256 hash:
31517bc2ee1a8d120161ce23d6301a561dc646016c47b4746721ecf60a149478
MD5 hash:
04a041e1391a2083063d1f8512ee5d9c
SHA1 hash:
b35eb5856a70045e33e6352c98a68fd4792fbc13
SH256 hash:
6529c1eb48d6a4ffe24e91bb65cab349436408048d403edf9fcfa38ac617d38b
MD5 hash:
aebba1a56e0d716d2e4b6676888084c8
SHA1 hash:
fb0fc0de54c2f740deb8323272ff0180e4b89d99
SH256 hash:
ab2ec9b130e539e68fdfb822f8c3fda9ba74560e7933210f47477e82bb08c4e5
MD5 hash:
be37bdabe36f0a66e8b3081e8797218a
SHA1 hash:
de93272dbca71c78d61ae131ee3dc97f7cd1ea7b
SH256 hash:
d90a03e850735fa12f2209a57191524ffc9c2f321a65ee7f3b51e083eb59b80f
MD5 hash:
f5ba66ed9cc96376d02e02bbfc59f460
SHA1 hash:
9d6393ea4739724156dd0cfacc5cb8db2e52f32c
SH256 hash:
d4050b4dc2921e350c3d214bfff08aa0b616cf26212cab2e63be05747aa6703f
MD5 hash:
a237095a767ea5e743a00c3c81e620de
SHA1 hash:
1bd3d63415c55b0ba979c59577319266bf9e3913
SH256 hash:
f64759837bbb18960f5acab25fb18404c7bdb46312676672134ac2c00454befb
MD5 hash:
7ec7b612ff4f9771629ae397c77baf18
SHA1 hash:
0e10994968563b5f11dcbbb965023bc2404142e3
SH256 hash:
8ed9f410b41e51f09304e5cdadc4d61f82562c9ee15be810e063f2f568812dd0
MD5 hash:
0c3f670f496ffcf516fe77d2a161a6ee
SHA1 hash:
0c59d3494b38d768fe120e0a4ca2a1dca7567e6e
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
8d063d3aef4de69722e7dd08b9bda5fdf20da6d80a157d3f07fa0c3d5407e49d
MD5 hash:
559948db5816ae7ab26eb2eb533887ed
SHA1 hash:
e60442c6fb35239d298b01b0f4558264c01b2e7f
SH256 hash:
8206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
MD5 hash:
1c7be730bdc4833afb7117d48c3fd513
SHA1 hash:
dc7e38cfe2ae4a117922306aead5a7544af646b8
SH256 hash:
4d4ad145431ee356221914f2908ff9b4a4a56f90b9409ec752f7be1a978e7435
MD5 hash:
ae7c477ce9bd98d13ccff5fc4a0d190e
SHA1 hash:
249ff902f66c3d0cee6656802b14a9c34807bc8f
SH256 hash:
8a36507def063aedc44e08d66f4da81bff8e5a5d436371c9f4fdfa74644fc9d1
MD5 hash:
44fbb3742db48ec9c036482af08d3653
SHA1 hash:
e846b920ee5cc78dc796cc7c97015df942095be5
SH256 hash:
df26b54b984ae1b94fecde99e7b0513a305164f9000929d3467a95d16e33667d
MD5 hash:
e0fe9226cd6652b14cc47ee7f35ae1d6
SHA1 hash:
b3de7a40c3586fe45ba1cd4e8929760d8a697250
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments