MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e55e95de03dff2a35cb8304d855c944a5309c56ff8d369af0a542e600faa6808. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 8 File information Comments

SHA256 hash: e55e95de03dff2a35cb8304d855c944a5309c56ff8d369af0a542e600faa6808
SHA3-384 hash: 772d9d303c93aff4bb4c091b45a498c315ff4ae4554e14cdf44ede32b1ddc14797f60329bb19300d62555070541a9a4e
SHA1 hash: 8be30d706d5de45bfdba5ff38caba3e9e982fa1b
MD5 hash: 28a5b3bc1801ea6443643f1ad8710a82
humanhash: louisiana-north-butter-stream
File name:28A5B3BC1801EA6443643F1AD8710A82.exe
Download: download sample
Signature RedLineStealer
File size:3'222'826 bytes
First seen:2021-05-31 18:21:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 49152:UbA30qmWHSGE4SfYLZgCF37tW/8smDztKxOR3fubQDm5hUkMU/4Ngn3zb3Njjapi:UburFSfQL0gDpKx0DDUUmqWZGDx4np7
Threatray 752 similar samples on MalwareBazaar
TLSH C3E52301BEC16872D672183159799B21687FBC241F18CEAB93F42B5DDA351C0EB31FA6
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
162.55.55.250:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
162.55.55.250:80 https://threatfox.abuse.ch/ioc/67974/

Intelligence


File Origin
# of uploads :
1
# of downloads :
191
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
28A5B3BC1801EA6443643F1AD8710A82.exe
Verdict:
Malicious activity
Analysis date:
2021-05-31 18:23:17 UTC
Tags:
evasion autoit trojan rat redline phishing

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Launching a process
Creating a file in the %temp% subdirectories
DNS request
Sending a custom TCP request
Sending a UDP request
Creating a file
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Reading critical registry keys
Deleting a recently created file
Delayed reading of the file
Creating a file in the %AppData% directory
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Using the Windows Management Instrumentation requests
Sending an HTTP POST request
Modifying a system file
Replacing files
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Stealing user critical data
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Sending an HTTP POST request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Cookie Stealer Cyberduck RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Benign windows process drops PE files
Binary is likely a compiled AutoIt script file
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected VMProtect packer
DLL reload attack detected
Drops PE files to the document folder of the user
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Cookie Stealer
Yara detected Cyberduck
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 427247 Sample: oltydQU2Hj.exe Startdate: 31/05/2021 Architecture: WINDOWS Score: 100 169 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->169 171 Found malware configuration 2->171 173 Multi AV Scanner detection for submitted file 2->173 175 11 other signatures 2->175 9 oltydQU2Hj.exe 1 12 2->9         started        12 iexplore.exe 2 89 2->12         started        process3 file4 95 C:\Users\user\Desktop\pub2.exe, PE32 9->95 dropped 97 C:\Users\user\Desktop\KRSetp.exe, PE32 9->97 dropped 99 C:\Users\user\Desktop\pzyh.exe, PE32 9->99 dropped 101 3 other files (none is malicious) 9->101 dropped 14 KRSetp.exe 15 8 9->14         started        19 Folder.exe 9->19         started        21 pub2.exe 9->21         started        27 3 other processes 9->27 23 iexplore.exe 12->23         started        25 iexplore.exe 12->25         started        process5 dnsIp6 147 news-systems.xyz 172.67.145.48, 443, 49737 CLOUDFLARENETUS United States 14->147 149 192.168.2.1 unknown unknown 14->149 103 C:\Users\user\AppData\Roaming\6634142.exe, PE32 14->103 dropped 105 C:\Users\user\AppData\Roaming\4347980.exe, PE32 14->105 dropped 107 C:\Users\user\AppData\Roaming\5961664.exe, PE32 14->107 dropped 109 C:\Users\user\AppData\Roaming\3153007.exe, PE32 14->109 dropped 159 Performs DNS queries to domains with low reputation 14->159 29 6634142.exe 14->29         started        33 4347980.exe 14->33         started        36 5961664.exe 14->36         started        38 3153007.exe 14->38         started        111 C:\Users\user\AppData\Local\...\install.dll, PE32 19->111 dropped 40 rundll32.exe 19->40         started        42 conhost.exe 19->42         started        113 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 21->113 dropped 161 DLL reload attack detected 21->161 163 Detected unpacking (changes PE section rights) 21->163 165 Renames NTDLL to bypass HIPS 21->165 167 3 other signatures 21->167 44 explorer.exe 21->44 injected 151 iplogger.org 23->151 153 ip-api.com 208.95.112.1, 49730, 80 TUT-ASUS United States 27->153 155 star-mini.c10r.facebook.com 157.240.27.35, 443, 49732 FACEBOOKUS United States 27->155 157 3 other IPs or domains 27->157 115 C:\Users\user\AppData\Local\...\jg3_3uag.exe, PE32 27->115 dropped 117 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 27->117 dropped 119 C:\Users\user\AppData\Local\Temp\...\File.exe, PE32 27->119 dropped 46 jg3_3uag.exe 16 27->46         started        48 6 other processes 27->48 file7 signatures8 process9 dnsIp10 133 217.107.34.191 RTCOMM-ASRU Russian Federation 29->133 197 Sample uses process hollowing technique 29->197 199 Injects a PE file into a foreign processes 29->199 50 AddInProcess32.exe 29->50         started        54 AddInProcess32.exe 29->54         started        73 C:\Users\user\AppData\...\WinHoster.exe, PE32 33->73 dropped 201 Detected unpacking (changes PE section rights) 33->201 56 WinHoster.exe 33->56         started        135 172.67.186.78 CLOUDFLARENETUS United States 36->135 75 C:\ProgramData\70\vcruntime140.dll, PE32 36->75 dropped 77 C:\ProgramData\70\sqlite3.dll, PE32 36->77 dropped 79 C:\ProgramData\70\softokn3.dll, PE32 36->79 dropped 87 4 other files (none is malicious) 36->87 dropped 58 WerFault.exe 36->58         started        137 172.67.163.99 CLOUDFLARENETUS United States 38->137 81 C:\ProgramData\67\vcruntime140.dll, PE32 38->81 dropped 89 6 other files (none is malicious) 38->89 dropped 203 Writes to foreign memory regions 40->203 205 Allocates memory in foreign processes 40->205 207 Creates a thread in another existing process (thread injection) 40->207 60 svchost.exe 40->60 injected 62 svchost.exe 40->62 injected 64 svchost.exe 40->64 injected 139 181.57.221.246 TelmexColombiaSACO Colombia 44->139 83 C:\Users\user\AppData\Roaming\ghcwbvi, PE32 44->83 dropped 209 Benign windows process drops PE files 44->209 211 Hides that the sample has been downloaded from the Internet (zone.identifier) 44->211 66 WinHoster.exe 44->66         started        141 101.36.107.74, 49724, 80 UHGL-AS-APUCloudHKHoldingsGroupLimitedHK China 46->141 143 iplogger.org 88.99.66.31, 443, 49726, 49727 HETZNER-ASDE Germany 46->143 85 C:\Users\user\Documents\...\jg3_3uag.exe, PE32 46->85 dropped 213 Antivirus detection for dropped file 46->213 215 Drops PE files to the document folder of the user 46->215 217 Machine Learning detection for dropped file 46->217 219 Tries to harvest and steal browser information (history, passwords, etc) 46->219 145 188.120.255.239, 49731, 80 THEFIRST-ASRU Russian Federation 48->145 file11 signatures12 process13 dnsIp14 121 172.67.75.172 CLOUDFLARENETUS United States 50->121 123 162.55.55.250 ACPCA United States 50->123 177 Tries to harvest and steal browser information (history, passwords, etc) 50->177 179 Tries to steal Crypto Currency Wallets 50->179 181 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 54->181 183 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 54->183 185 Detected unpacking (changes PE section rights) 56->185 125 13.64.90.137 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 58->125 187 System process connects to network (likely due to code injection or exploit) 60->187 189 Sets debug register (to hijack the execution of another thread) 60->189 191 Modifies the context of a thread in another process (thread injection) 60->191 68 svchost.exe 60->68         started        signatures15 process16 dnsIp17 127 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 68->127 129 104.21.21.221 CLOUDFLARENETUS United States 68->129 131 172.67.200.215 CLOUDFLARENETUS United States 68->131 91 C:\Users\user\AppData\...\Login Data.tmp, SQLite 68->91 dropped 93 C:\Users\user\AppData\Local\...\Cookies.tmp, SQLite 68->93 dropped 193 Query firmware table information (likely to detect VMs) 68->193 195 Tries to harvest and steal browser information (history, passwords, etc) 68->195 file18 signatures19
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-05-29 07:49:02 UTC
AV detection:
28 of 46 (60.87%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader botnet:8 backdoor discovery evasion infostealer persistence spyware stealer trojan upx vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
NTFS ADS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
autoit_exe
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateProcessExOtherParentProcess
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
wimuawzice.xyz:80
http://20xbtc.com/upload/
http://yzsnw.com/upload/
http://kaledebiyat.com/upload/
http://expertizizmir.com/upload/
http://dedkndy.com/upload/
http://theuncu.com/upload/
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_HyperPro03
Author:ditekSHen
Description:Hunt HyperPro IronTiger / LuckyMouse / APT27 malware
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:win_smokeloader_a2
Author:pnx
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments