MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e9f1bfdfb6c8229f57b9bec5149d4dc3af2c148ffb694d8ae32ceeca1530d1fe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 22 File information Comments

SHA256 hash: e9f1bfdfb6c8229f57b9bec5149d4dc3af2c148ffb694d8ae32ceeca1530d1fe
SHA3-384 hash: 568ea53ba8150f7583f37cb47a226b581b3f9775287a1e1b7f3deae5f8a19721a36cad9719a7be55de1f05ef7062585b
SHA1 hash: fd903bf1e4cd25a375c8509b77bf477d3f010211
MD5 hash: 4828c0dd532520a0178ef12e11ad2a2c
humanhash: robin-montana-fourteen-triple
File name:4828C0DD532520A0178EF12E11AD2A2C.exe
Download: download sample
Signature RedLineStealer
File size:3'525'723 bytes
First seen:2021-06-18 00:42:18 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6e7f9a29f2c85394521a08b9f31f6275 (291 x GuLoader, 50 x VIPKeylogger, 48 x RemcosRAT)
ssdeep 98304:JTnGDH+SH8W07onTOSZqS09hb2d3z9E1Hnl0iXQJi2OXX14:JTUHTcWFniYR09Ez9E1FFgJiVH14
Threatray 56 similar samples on MalwareBazaar
TLSH 48F53380FB4092A2F9F421741E4E7B749EBB4DD669A2E4468FC02F0CBF91D64D962F05
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.84.1.250:49052

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.84.1.250:49052 https://threatfox.abuse.ch/ioc/135605/

Intelligence


File Origin
# of uploads :
1
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4828C0DD532520A0178EF12E11AD2A2C.exe
Verdict:
No threats detected
Analysis date:
2021-06-18 00:43:15 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect sleep reduction / modifications
Contains functionality to infect the boot sector
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DLL reload attack detected
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Renames NTDLL to bypass HIPS
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 436444 Sample: xIJ2Rh8eij.exe Startdate: 18/06/2021 Architecture: WINDOWS Score: 100 98 8.209.115.89 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 2->98 100 email.yg9.me 2->100 102 6 other IPs or domains 2->102 124 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->124 126 Multi AV Scanner detection for domain / URL 2->126 128 Found malware configuration 2->128 130 10 other signatures 2->130 11 xIJ2Rh8eij.exe 9 2->11         started        14 svchost.exe 2->14         started        17 explorer.exe 2->17         started        signatures3 process4 file5 88 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->88 dropped 19 setup_installer.exe 16 11->19         started        172 Sets debug register (to hijack the execution of another thread) 14->172 174 Modifies the context of a thread in another process (thread injection) 14->174 signatures6 process7 file8 80 C:\Users\user\AppData\...\setup_install.exe, PE32 19->80 dropped 82 C:\Users\user\AppData\Local\...\metina_8.exe, PE32 19->82 dropped 84 C:\Users\user\AppData\Local\...\metina_7.exe, PE32 19->84 dropped 86 11 other files (6 malicious) 19->86 dropped 22 setup_install.exe 1 19->22         started        process9 dnsIp10 104 razino.xyz 104.21.86.8, 49746, 80 CLOUDFLARENETUS United States 22->104 106 127.0.0.1 unknown unknown 22->106 168 Detected unpacking (changes PE section rights) 22->168 170 Performs DNS queries to domains with low reputation 22->170 26 cmd.exe 1 22->26         started        28 cmd.exe 1 22->28         started        30 cmd.exe 22->30         started        32 6 other processes 22->32 signatures11 process12 process13 34 metina_1.exe 8 26->34         started        38 metina_3.exe 91 28->38         started        41 metina_6.exe 30->41         started        43 metina_4.exe 2 2 32->43         started        45 metina_2.exe 1 32->45         started        47 metina_8.exe 32->47         started        49 2 other processes 32->49 dnsIp14 72 4 other files (none is malicious) 34->72 dropped 132 Machine Learning detection for dropped file 34->132 51 rundll32.exe 34->51         started        108 159.69.20.131 HETZNER-ASDE Germany 38->108 116 2 other IPs or domains 38->116 74 12 other files (none is malicious) 38->74 dropped 134 Detected unpacking (changes PE section rights) 38->134 136 Detected unpacking (overwrites its own PE header) 38->136 138 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 38->138 154 2 other signatures 38->154 110 privacytoolsforyou.xyz 185.156.177.26, 49756, 80 RACKTECHRU Russian Federation 41->110 112 jom.diregame.live 104.21.65.45, 443, 49753 CLOUDFLARENETUS United States 41->112 118 7 other IPs or domains 41->118 62 C:\Users\...\kt1Gkz7sKLdg5oucX4kq4Ban.exe, PE32 41->62 dropped 64 C:\Users\...\T2QWEiTYLd5ryWNb3KG15dBN.exe, PE32 41->64 dropped 66 C:\Users\...\62NA35HDZarhg41YaTV74G92.exe, PE32 41->66 dropped 76 11 other files (none is malicious) 41->76 dropped 140 Creates HTML files with .exe extension (expired dropper behavior) 41->140 142 Performs DNS queries to domains with low reputation 41->142 114 ip-api.com 208.95.112.1, 49747, 80 TUT-ASUS United States 43->114 120 2 other IPs or domains 43->120 78 2 other malicious files 43->78 dropped 144 Antivirus detection for dropped file 43->144 146 May check the online IP address of the machine 43->146 54 jfiag3g_gg.exe 43->54         started        68 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 45->68 dropped 148 DLL reload attack detected 45->148 150 Renames NTDLL to bypass HIPS 45->150 152 Checks if the current machine is a virtual machine (disk enumeration) 45->152 156 2 other signatures 47->156 56 metina_8.exe 47->56         started        70 C:\Users\user\AppData\Local\...\metina_5.tmp, PE32 49->70 dropped 58 metina_5.tmp 49->58         started        file15 signatures16 process17 dnsIp18 158 Contains functionality to infect the boot sector 51->158 160 Contains functionality to inject threads in other processes 51->160 162 Contains functionality to inject code into remote processes 51->162 166 5 other signatures 51->166 164 Tries to harvest and steal browser information (history, passwords, etc) 54->164 122 cor-tips.com 198.54.116.159 NAMECHEAP-NETUS United States 58->122 90 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 58->90 dropped 92 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 58->92 dropped 94 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 58->94 dropped 96 C:\Users\user\AppData\Local\...\(Diadora).exe, PE32 58->96 dropped file19 signatures20
Threat name:
Win32.Trojan.CookiesStealer
Status:
Malicious
First seen:
2021-06-15 10:58:02 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:plugx family:redline family:smokeloader family:vidar aspackv2 backdoor discovery infostealer persistence spyware stealer trojan upx
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Delays execution with timeout.exe
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
ASPack v2.12-2.42
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
UPX packed file
Vidar Stealer
PlugX
RedLine
RedLine Payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://ppcspb.com/upload/
http://mebbing.com/upload/
http://twcamel.com/upload/
http://howdycash.com/upload/
http://lahuertasonora.com/upload/
http://kpotiques.com/upload/
Unpacked files
SH256 hash:
753b02fff3b6da0de94729ced4e416945ace669005bc824ddf5ba00ba995fbd1
MD5 hash:
2d030aeabd05ee82e02e1a428c80a216
SHA1 hash:
436f7f55a7cd157351db63c8ff549cd24232152f
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
ef3c9b49315640ab3d0ff3f0a310c3dded0e3b85fc4fc0bf35b37a6193a36ada
MD5 hash:
d5551243fc77866b384583c11dd67061
SHA1 hash:
60a9edffbb3985a211b52ce4933c3382ade944fb
SH256 hash:
38ed919245b0f5bdf5a08cac11d91830103e8e5f0806e06495e38f100095c09d
MD5 hash:
eb898f476eabf6dbf6192e1f05346ab3
SHA1 hash:
a89d8d05959d2e49712a6ba805591f4914ba0f5e
SH256 hash:
be10ea7e6f0a444ce05dff088f49e97744bd74242ac01bbf484ca2c6dfb60051
MD5 hash:
7a066948adabecf897433dfa90e6a796
SHA1 hash:
45d0b90c32996e90494922fbb7fb848a4b07ffa0
SH256 hash:
400ee739fcb0827d2bd9b65758c7ac6cd181fce1f2237460f4d2ef75f7941155
MD5 hash:
c12c6bc5301bfeba4066c2a03ba744c7
SHA1 hash:
33214cf494a2ec39a072d833c0081d39556d740a
SH256 hash:
7d949047a33a4c10a5e856fb7a019f90ba672aed7d3a8eebf7904253e92a6a9c
MD5 hash:
332fc55d7c5718ef66649be271546061
SHA1 hash:
30b68fb3996a1302ab1d0af4c1980a5544c4e102
Detections:
win_vidar_auto
SH256 hash:
cec7a92e19c44c5cbf66de2ceda993c29d88a60fccb20cf170611725887a2626
MD5 hash:
d5b43b52e76ed607e77062961b01d27b
SHA1 hash:
7fb32d68fd04a49373840f73ea94a020b11d2616
SH256 hash:
a9316c698416b65567ce3c22e55498b0a31f61150ff65a73020f527fe6ebc924
MD5 hash:
f09c80632924b7d1dc3bdfa96dc5779a
SHA1 hash:
f65330d926ee450cb9b9cb3f8842440910c22e6b
SH256 hash:
583782e3d89f932fe02a5a11d90e654e2524e714be1b1a2d2e3955a5bb997953
MD5 hash:
e86bc096689e34bedebe4894f57ed476
SHA1 hash:
de42a417fa65345b45fc7cd5af7723bce803db02
SH256 hash:
7920fd15a8bd5f1850320cd9b396891fa43e06ed8029943cd9d213a99e7f28e4
MD5 hash:
a7c96ceb8d0f594cad7e8e8e8924b0eb
SHA1 hash:
d80ee30fcdb6d78b634aba45f81f796a13b1446d
SH256 hash:
118906013a736827fb187c6a869104a95583e35cc844d3585a689bae05b67274
MD5 hash:
bac81491b7367ad2db1e7d5ad3f6c02f
SHA1 hash:
d60efc63e9c3841e082b626965d4144b65175e0f
SH256 hash:
f8e085b978dd9420f207869c472797a831133385512b1b95866ff98064ce29e2
MD5 hash:
9c3c5ca46b5979d97147757b4165423a
SHA1 hash:
cb6d145b4f8b950dfb858cce4d521b626a97634f
SH256 hash:
5eb253bca6e796b7e997ec8f7dcf1c8b474e47d22531e4f72afb13a341600d59
MD5 hash:
ecbedfd3e2dfa9603cc8edc58a41f169
SHA1 hash:
981a6ec6b8030237f3f398adb4c3a8ffa46097e9
SH256 hash:
07c213d10791ee115d5913d0fd9be0f5a1686955e73b56227d2d01c5677d9595
MD5 hash:
85610db1a61cf1e23f89a4d028fd18fa
SHA1 hash:
84a9cc612447b37d3317a95947191ab9ceade8c5
SH256 hash:
eb3691d3a707c8b1d5b45402ef3344d7e6388eaac64065a13cf5c9afa53a2b01
MD5 hash:
3038ae600c1657fad2fdc1a3072820d2
SHA1 hash:
6a855667f0219302dbe1ab2c80feb56c8822051b
SH256 hash:
f9c807b2a0fa1f369ff8632d82da156cab75434e6784721b25ce2dfca3057071
MD5 hash:
79b4e19cc64ae1298e07a9bce03685ea
SHA1 hash:
67a2ef28606116fbea641125b571f207b4d71b75
SH256 hash:
a7207a8093526a363bc46be55efd73c9b823e28817f1292889c4edb7d5429e0a
MD5 hash:
9ad22a7028f3fd083b0e8c52a1adf3b6
SHA1 hash:
3a71172439ea0e02eeff6bec0da753a35c661adb
SH256 hash:
0469b5e6901a0c7d2bcbdc5dff96f6afa820d051cda71bb73511b510d7c562bd
MD5 hash:
5f3ac7da849a1df5c5492bb0b5990ab7
SHA1 hash:
3e8cab2cad6832a787e1fde6b33e46c37a9444cd
SH256 hash:
f7f53c70076264c4e37140db49dca34283090f3ddacd488426d7501b13922ec9
MD5 hash:
5ed5332fe3817cf816ad2af9cc7276c4
SHA1 hash:
bd0e138a44cd7e1a6e29610cec9d6f12d25074cf
SH256 hash:
18d0727bcbfb6246663aa24650cd74c4c47bc4772a869272517c972635217c64
MD5 hash:
8a080cd25c3eec2a3e9f3dd21363b74a
SHA1 hash:
37bdd3b15a718970a2ac017d03843aa785456555
SH256 hash:
d97dcc826298c61f22285b16398519a2d8dba9ca5e6005764c33b4042885dabd
MD5 hash:
05f992bbf4db045f69250292d48fd39a
SHA1 hash:
cfad4e6aae2805ae06b43a4164f62d4618b79dbb
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
e9f1bfdfb6c8229f57b9bec5149d4dc3af2c148ffb694d8ae32ceeca1530d1fe
MD5 hash:
4828c0dd532520a0178ef12e11ad2a2c
SHA1 hash:
fd903bf1e4cd25a375c8509b77bf477d3f010211
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:INDICATOR_SUSPICOIUS_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:UAC_bypass_bin_mem
Author:James_inthe_box
Description:UAC bypass in files like avemaria
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload
Rule name:win_vidar_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments