MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dfa8a3136cdf32e554997545432c51b3c8c712500b857140f6d7f9ad1b1789d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: dfa8a3136cdf32e554997545432c51b3c8c712500b857140f6d7f9ad1b1789d6
SHA3-384 hash: ef3084e3140193cab4c66cb68366d59ccc0cddb0ed67a1853ff6907e80cbdd52c4dddd45a64b4eef91eb9bb1dbd9b9e4
SHA1 hash: 4feba21e86b44b5f27cda4376d0f3a7ddc33b63b
MD5 hash: 58a640b0c8d5935fa229131b64aa80ac
humanhash: oklahoma-kentucky-west-chicken
File name:58a640b0c8d5935fa229131b64aa80ac.exe
Download: download sample
Signature RedLineStealer
File size:1'958'400 bytes
First seen:2022-11-27 11:50:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'660 x AgentTesla, 19'470 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 49152:yfZwCTG65aYImGBMIBW2jX66ws6ij48N2w:Cw8JImGB7k2jXTLnAw
TLSH T1BC9523296D4101FAD0B412F6C7FA167ED38E4D036793C23D96170A462359728ED8EFEA
TrID 35.4% (.EXE) Win64 Executable (generic) (10523/12/4)
22.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.1% (.EXE) Win32 Executable (generic) (4505/5/1)
6.9% (.ICL) Windows Icons Library (generic) (2059/9)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 68fcc4e4e4e4e4d8 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
94.130.179.90:21188

Intelligence


File Origin
# of uploads :
1
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
58a640b0c8d5935fa229131b64aa80ac.exe
Verdict:
Malicious activity
Analysis date:
2022-11-27 11:51:04 UTC
Tags:
loader trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Launching a process
Searching for synchronization primitives
Creating a window
Searching for the window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Eternity Malware
Verdict:
Malicious
Result
Threat name:
Cryptolocker, Eternity Worm, RedLine, Sm
Detection:
malicious
Classification:
rans.troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Found ransom note / readme
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Writes a notice file (html or txt) to demand a ransom
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Cryptolocker ransomware
Yara detected Eternity Worm
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 754616 Sample: zMUopWM6iS.exe Startdate: 27/11/2022 Architecture: WINDOWS Score: 100 102 Antivirus detection for URL or domain 2->102 104 Antivirus detection for dropped file 2->104 106 Antivirus / Scanner detection for submitted sample 2->106 108 14 other signatures 2->108 13 zMUopWM6iS.exe 8 4 2->13         started        16 Pasta2.exe 2 2->16         started        process3 file4 82 C:\Users\user\AppData\Local\Temp\Pasta2.exe, PE32 13->82 dropped 84 C:\Users\user\AppData\...\zMUopWM6iS.exe.log, CSV 13->84 dropped 19 Pasta2.exe 3 13->19         started        22 EXCEL.EXE 22 19 13->22         started        100 Injects a PE file into a foreign processes 16->100 25 Pasta2.exe 16->25         started        signatures5 process6 dnsIp7 126 Antivirus detection for dropped file 19->126 128 Multi AV Scanner detection for dropped file 19->128 130 Machine Learning detection for dropped file 19->130 132 Injects a PE file into a foreign processes 19->132 28 Pasta2.exe 3 19->28         started        96 192.168.2.1 unknown unknown 22->96 68 C:\Users\user\AppData\Local\...\tmp8CF2.tmp, PE32 25->68 dropped 70 C:\Users\user\AppData\...\tmp6823.tmp.exe, PE32 25->70 dropped file8 signatures9 process10 file11 80 C:\Users\user\AppData\Local\...\Pasta2.exe, PE32 28->80 dropped 31 cmd.exe 1 28->31         started        process12 signatures13 134 Uses schtasks.exe or at.exe to add and modify task schedules 31->134 136 Uses ping.exe to check the status of other devices and networks 31->136 34 Pasta2.exe 2 31->34         started        37 PING.EXE 1 31->37         started        40 conhost.exe 31->40         started        42 2 other processes 31->42 process14 dnsIp15 110 Antivirus detection for dropped file 34->110 112 Multi AV Scanner detection for dropped file 34->112 114 Machine Learning detection for dropped file 34->114 116 Injects a PE file into a foreign processes 34->116 44 Pasta2.exe 34->44         started        94 127.0.0.1 unknown unknown 37->94 48 conhost.exe 40->48         started        signatures16 process17 dnsIp18 98 167.88.170.23, 49701, 49702, 80 PONYNETUS United States 44->98 86 C:\Users\user\Desktop\HQJBRDYKDE.exe, PE32 44->86 dropped 88 C:\Users\user\Desktop\HMPPSXQPQV.exe, PE32 44->88 dropped 90 C:\Users\user\Desktop\BQJUWOYRTO.exe, PE32 44->90 dropped 92 25 other malicious files 44->92 dropped 50 101.exe 44->50         started        53 s101.exe 44->53         started        55 R101.exe 44->55         started        file19 process20 signatures21 118 Multi AV Scanner detection for dropped file 50->118 120 Machine Learning detection for dropped file 50->120 122 Writes a notice file (html or txt) to demand a ransom 50->122 57 101.exe 50->57         started        124 Injects a PE file into a foreign processes 53->124 60 s101.exe 53->60         started        62 s101.exe 53->62         started        64 s101.exe 53->64         started        process22 file23 72 C:\ProgramData\...\MasterDatastore.xml, COM 57->72 dropped 74 C:\ProgramData\Microsoft\MapData\ReadMe.txt, ASCII 57->74 dropped 76 C:\ProgramData\Microsoft\MF\ReadMe.txt, ASCII 57->76 dropped 78 8 other malicious files 57->78 dropped 66 explorer.exe 60->66 injected process24
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-11-24 12:29:42 UTC
File Type:
PE (.Net Exe)
Extracted files:
2
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
eternity
Score:
  10/10
Tags:
family:eternity
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Eternity
Malware Config
C2 Extraction:
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
08fef20cc97d6ab3a9dfa6da0cf804168fa862b6f1fcae7616d8dc8c75da9951
MD5 hash:
17f511ac04c38cc724a32db5ee6396df
SHA1 hash:
989d1cb5f7e47a84c375b7413928d7ab73e24ff5
SH256 hash:
a327516357b9fa1a75753b3fbd0030e13f374be7cefcdf983d0b731f278b0c59
MD5 hash:
404efdeb9931733904da07f96fabeb72
SHA1 hash:
7ce363cd612f1d9a90b33ec196c4d0a49cdaee02
SH256 hash:
a2c42eaf231d70cae0ec4aaaa6544f4575608817d50a228227b4ad1c421dc56d
MD5 hash:
757123036d63f0780e99e69131b8a312
SHA1 hash:
7310d13824d08f0c3891a41a19fa556f401b6eeb
SH256 hash:
6a3e51e28e36cd97a2583a95027eb800a228e40572070be67ec9fcd5790e2077
MD5 hash:
68d348019229f619929995cf7f7dfa4d
SHA1 hash:
9e2f888c42d51f91c900bec478e703fe145e1a54
SH256 hash:
b21a00c877994285d1e5ebc1f15f1e65fd532d2a06cfff7be51f6e1a4c17da7a
MD5 hash:
ccfccedf460da41401c282ae61f26f3e
SHA1 hash:
de06e80732091327c898fb780a697ff5572bd4a7
SH256 hash:
dfa8a3136cdf32e554997545432c51b3c8c712500b857140f6d7f9ad1b1789d6
MD5 hash:
58a640b0c8d5935fa229131b64aa80ac
SHA1 hash:
4feba21e86b44b5f27cda4376d0f3a7ddc33b63b
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments