MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1c8f91a01400615df83126a8b3a323425f30b5480d405b26adf2d924c21464f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 5 YARA 6 File information Comments

SHA256 hash: e1c8f91a01400615df83126a8b3a323425f30b5480d405b26adf2d924c21464f
SHA3-384 hash: fccf91ad32116e3dd4b7b5203d76a70a44a8d10771221e26d29570611272fc2fe429ca0f40b1d801c149dfa3ce9d1c43
SHA1 hash: e7d3db7eeb2d01ae30cc1a8e628379224c9cd583
MD5 hash: 8d744f7bea76b2cff67501320174dc53
humanhash: neptune-moon-jig-jupiter
File name:8D744F7BEA76B2CFF67501320174DC53.exe
Download: download sample
Signature RedLineStealer
File size:4'080'601 bytes
First seen:2021-08-21 18:55:08 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:yKJZw2Zs03SGh6mYCnw8njzAP7u21Q54yrKNe6jLRufhimI8h:yQDtNh6VMj0P7vW4pHwhjI8h
Threatray 391 similar samples on MalwareBazaar
TLSH T1E416335AFB593949CD8380301DF903721AA7282322C3956F57F0A5C469E56DB4EACB3F
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.117.75.123:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.117.75.123:80 https://threatfox.abuse.ch/ioc/192522/
45.14.49.232:6811 https://threatfox.abuse.ch/ioc/192537/
185.204.109.146:54891 https://threatfox.abuse.ch/ioc/192538/
31.44.3.94:62655 https://threatfox.abuse.ch/ioc/192542/
95.181.157.69:8552 https://threatfox.abuse.ch/ioc/192550/

Intelligence


File Origin
# of uploads :
1
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
8D744F7BEA76B2CFF67501320174DC53.exe
Verdict:
No threats detected
Analysis date:
2021-08-21 18:56:37 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Sending a custom TCP request
Creating a process from a recently created file
Sending a UDP request
Creating a file
Searching for the window
Running batch commands
Connection attempt
DNS request
Sending an HTTP GET request
Deleting a recently created file
Launching a process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Disable Windows Defender real time protection (registry)
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 469237 Sample: CjmRv8Bomq.exe Startdate: 21/08/2021 Architecture: WINDOWS Score: 100 70 188.34.200.103 HETZNER-ASDE Germany 2->70 72 88.99.66.31 HETZNER-ASDE Germany 2->72 74 5 other IPs or domains 2->74 108 Antivirus detection for dropped file 2->108 110 Multi AV Scanner detection for dropped file 2->110 112 Multi AV Scanner detection for submitted file 2->112 114 11 other signatures 2->114 10 CjmRv8Bomq.exe 10 2->10         started        13 svchost.exe 1 2->13         started        signatures3 process4 file5 60 C:\Users\user\AppData\...\setup_installer.exe, PE32 10->60 dropped 15 setup_installer.exe 18 10->15         started        process6 file7 62 C:\Users\user\AppData\...\setup_install.exe, PE32 15->62 dropped 64 C:\Users\user\...\Wed01a8b6b8c7fec.exe, PE32 15->64 dropped 66 C:\Users\user\AppData\...\Wed01a14e6b619e.exe, PE32+ 15->66 dropped 68 13 other files (6 malicious) 15->68 dropped 18 setup_install.exe 1 15->18         started        process8 dnsIp9 76 172.67.190.165 CLOUDFLARENETUS United States 18->76 78 127.0.0.1 unknown unknown 18->78 116 Adds a directory exclusion to Windows Defender 18->116 22 cmd.exe 18->22         started        24 cmd.exe 1 18->24         started        27 cmd.exe 1 18->27         started        29 6 other processes 18->29 signatures10 process11 signatures12 31 Wed0179eaaaa6.exe 22->31         started        118 Obfuscated command line found 24->118 120 Uses ping.exe to sleep 24->120 122 Uses ping.exe to check the status of other devices and networks 24->122 124 Adds a directory exclusion to Windows Defender 24->124 36 powershell.exe 24 24->36         started        38 Wed01a14e6b619e.exe 1 14 27->38         started        40 Wed011a9398da.exe 29->40         started        42 Wed01a8b6b8c7fec.exe 12 29->42         started        44 Wed019a626e7c354d.exe 29->44         started        46 Wed01aaa40eed780df6.exe 2 29->46         started        process13 dnsIp14 80 185.233.185.134 YURTEH-ASUA Russian Federation 31->80 82 37.0.10.214 WKD-ASIE Netherlands 31->82 90 11 other IPs or domains 31->90 48 C:\Users\user\AppData\...\tepserv[1].exe, PE32 31->48 dropped 50 C:\Users\user\AppData\Local\...\pub1[1].exe, PE32 31->50 dropped 52 C:\Users\user\AppData\Local\...\file5[1].exe, PE32 31->52 dropped 58 35 other files (12 malicious) 31->58 dropped 94 Tries to harvest and steal browser information (history, passwords, etc) 31->94 96 Disable Windows Defender real time protection (registry) 31->96 84 208.95.112.1 TUT-ASUS United States 38->84 86 8.8.8.8 GOOGLEUS United States 38->86 92 2 other IPs or domains 38->92 54 C:\Users\user\AppData\...\fastsystem.exe, PE32+ 38->54 dropped 56 C:\Users\user\AppData\...\aaa_011[1].dll, DOS 38->56 dropped 98 Contains functionality to steal Chrome passwords or cookies 38->98 100 Drops PE files to the startup folder 38->100 102 Machine Learning detection for dropped file 40->102 104 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 40->104 106 Checks if the current machine is a virtual machine (disk enumeration) 40->106 88 74.114.154.22 AUTOMATTICUS Canada 42->88 file15 signatures16
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-08-18 14:24:23 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pab3 aspackv2 backdoor infostealer persistence stealer suricata trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Kills process with taskkill
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Nirsoft
Vidar Stealer
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Malware Config
C2 Extraction:
https://lenak513.tumblr.com/
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
185.215.113.15:61506
Unpacked files
SH256 hash:
a19adea0a2b66cfcb23eebd1d1ff9d854eccd4dc65536a45665c149da4ff6265
MD5 hash:
117c7ff5dd9efc0b059f64520f2d4f46
SHA1 hash:
ff07b1fcc58aa62b42d797981e0d953d9f9e0120
SH256 hash:
e764cf9d6834ab39436de3fffb0c3b023e3f05051b84b35689ab61a6705e0bdd
MD5 hash:
34aa457fed673b5c3cec68d05df16473
SHA1 hash:
f31f729d3bb5e0e205e0fb80abc33800d4d92d96
SH256 hash:
a246e8f2012d1d360808f65615094f021006cc20db4198f1ef418e06a83ae020
MD5 hash:
1023617d898b5d15e575cfd311f37137
SHA1 hash:
dcca44e1db5ac24004cb155d072ed856eed4cfd2
SH256 hash:
416e63fb614101d5644592d5f589f358f8d5a41dd6812a717cbf05470864ac6f
MD5 hash:
45a47d815f2291bc7fc0112d36aaad83
SHA1 hash:
db1dc02b2d64c4c3db89b5df3124dd87d43059d5
SH256 hash:
080d4e88108eabd951ae69ce8396e704524dff4000eb82f6c143824c82625a41
MD5 hash:
c0ec12029892225ece4460ed4b151870
SHA1 hash:
d033ba0a3983fa9842af6eaa50c8b539a28aa032
SH256 hash:
27852d40359a07d355463a7b833d2f612e69a292486e73a146f90ecbf268843a
MD5 hash:
29a9adb2a191a250583bbdeed81ca8e9
SHA1 hash:
1fd02fe7768f007828ed2a2250ab8d82cf51f903
SH256 hash:
1ab460eac81001bfa0da8cbadfd4fba0ad0f371742a2c725ff5cf71bdd8e2b9f
MD5 hash:
1dc95107f7dd6d1392bb8d9b53b76916
SHA1 hash:
b26f9c90ad4656d2ddf3e96da967e0f65a9623e1
SH256 hash:
d1ff2f8a510fb4d25dd861e4cd5196585ccdd66cd6e941941e13d634da825f32
MD5 hash:
e3ed5e6a62ece3cf158688bce4161fbf
SHA1 hash:
5a8c4dddf69e8650952b0d29987cc6edfe25fb0b
SH256 hash:
ab9bb888f6235eaee1ad52cd9b4d1f960ea09743ff80919d0095383f3683c583
MD5 hash:
eff546ee925781db419befdf93bd045d
SHA1 hash:
1129b509403fa589b50310f99f77c69ecc7f8314
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
592266762c8acdf9307fc05f27b5050c4d552cd4a246bb6fe86152c5bed882a5
MD5 hash:
de21a527a1e34ae417e4fcfa7229144f
SHA1 hash:
140636724f21af0713475465cbb82335af6935c7
SH256 hash:
852557565e5c087b8e0418aab93b965dab664921f90fe97c637c7c25f3943c15
MD5 hash:
24f728621b77799af752871f4d4f46f1
SHA1 hash:
f62ac8022f511a308d15db2cacb841a1b4e999c4
SH256 hash:
2847b06a065a81583ecd6399f93e602b3348ec088a46c5eb770d1f68450e4797
MD5 hash:
48ab669ec5fc99f7b572d39e868c0f8d
SHA1 hash:
89496351923a0e568cf5652b4666d98eab67492e
SH256 hash:
b4f043117c38321753dff916ab426d96dada98b20fb23f227c8423ee7921521b
MD5 hash:
8f11aa02a035739f0cf8bc8f406d358e
SHA1 hash:
1ed3094b564da463d754a8458b99694a34e99ea2
SH256 hash:
ec9f32d2a2849a72357e5e33f25c92750dddac116c1afd93fe8a00a0cb7d2b60
MD5 hash:
296adcb9cf6b50f991fba7371c211500
SHA1 hash:
d6b72449c107b5a0615592ad26686876f79d55d0
SH256 hash:
e1c8f91a01400615df83126a8b3a323425f30b5480d405b26adf2d924c21464f
MD5 hash:
8d744f7bea76b2cff67501320174dc53
SHA1 hash:
e7d3db7eeb2d01ae30cc1a8e628379224c9cd583
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments