MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eaa6d13d610e89b2fdedafd985d58abac85a3193c0701ded97c3c77e2a401da4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 7 File information Comments

SHA256 hash: eaa6d13d610e89b2fdedafd985d58abac85a3193c0701ded97c3c77e2a401da4
SHA3-384 hash: 9b388abd7002e6f7398a43b52e33421796e70b44e56fa323833a81dd301fab8edbd67e1b8a47a5ddd033fae193d44bba
SHA1 hash: 1718b8cba593cff40338cd46a640b2024f033750
MD5 hash: 0d549c3b2dec6c12d9cc2f2e13b926b5
humanhash: white-apart-kentucky-emma
File name:0d549c3b2dec6c12d9cc2f2e13b926b5.exe
Download: download sample
Signature RedLineStealer
File size:292'128 bytes
First seen:2023-11-29 01:20:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 87d552636d31eb7a2797c4a63e862d4a (4 x RedLineStealer)
ssdeep 6144:+yU1zKCKVDp3Cbitu7gJzmgkYUDBg8ZHAOa8DxL366G:+yU1K9pv6RZHBDR66G
TLSH T105547C0676D2C4B3C523123209E8C7B96E3EB9510F5189EFA7A44F7E8EB17C09E31569
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
194.49.94.80:29960

Intelligence


File Origin
# of uploads :
1
# of downloads :
363
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending a custom TCP request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Connecting to a non-recommended domain
Sending an HTTP POST request
Unauthorized injection to a system process
Enabling autorun by creating a file
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, RedLine, Smoke
Detection:
malicious
Classification:
troj.adwa.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
DNS related to crypt mining pools
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Yara detected XWorm
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1349639 Sample: SyztrUVjX7.exe Startdate: 29/11/2023 Architecture: WINDOWS Score: 100 133 xmr-eu1.nanopool.org 2->133 135 pastebin.com 2->135 137 78 other IPs or domains 2->137 151 Snort IDS alert for network traffic 2->151 153 Multi AV Scanner detection for domain / URL 2->153 155 Found malware configuration 2->155 161 22 other signatures 2->161 13 SyztrUVjX7.exe 1 2->13         started        16 XsdType.exe 2->16         started        18 jujfasb 2->18         started        signatures3 157 DNS related to crypt mining pools 133->157 159 Connects to a pastebin service (likely for C&C) 135->159 process4 signatures5 207 Contains functionality to inject code into remote processes 13->207 209 Writes to foreign memory regions 13->209 211 Allocates memory in foreign processes 13->211 213 Injects a PE file into a foreign processes 13->213 20 AppLaunch.exe 13->20         started        23 conhost.exe 13->23         started        215 Multi AV Scanner detection for dropped file 16->215 217 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->217 219 Modifies the context of a thread in another process (thread injection) 16->219 25 XsdType.exe 16->25         started        process6 signatures7 191 Found evasive API chain (may stop execution after checking system information) 20->191 193 Found API chain indicative of debugger detection 20->193 195 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->195 205 4 other signatures 20->205 27 explorer.exe 34 38 20->27 injected 197 Writes to foreign memory regions 25->197 199 Modifies the context of a thread in another process (thread injection) 25->199 201 Sample uses process hollowing technique 25->201 203 Injects a PE file into a foreign processes 25->203 32 MSBuild.exe 25->32         started        process8 dnsIp9 145 109.107.182.45 TELEPORT-TV-ASRU Russian Federation 27->145 147 185.196.8.238, 49739, 80 SIMPLECARRER2IT Switzerland 27->147 149 6 other IPs or domains 27->149 115 C:\Users\user\AppData\Roaming\hejfasb, PE32 27->115 dropped 117 C:\Users\user\AppData\Local\TempB51.exe, PE32+ 27->117 dropped 119 C:\Users\user\AppData\Local\Temp2F5.exe, PE32 27->119 dropped 121 13 other files (12 malicious) 27->121 dropped 221 System process connects to network (likely due to code injection or exploit) 27->221 223 Benign windows process drops PE files 27->223 225 Adds a directory exclusion to Windows Defender 27->225 227 Hides that the sample has been downloaded from the Internet (zone.identifier) 27->227 34 1149.exe 27->34         started        38 283E.exe 27->38         started        40 EB51.exe 3 27->40         started        42 10 other processes 27->42 229 Modifies the context of a thread in another process (thread injection) 32->229 231 Sample uses process hollowing technique 32->231 233 Injects a PE file into a foreign processes 32->233 file10 signatures11 process12 dnsIp13 91 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 34->91 dropped 93 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 34->93 dropped 95 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 34->95 dropped 101 2 other malicious files 34->101 dropped 163 Multi AV Scanner detection for dropped file 34->163 45 tuc3.exe 34->45         started        49 toolspub2.exe 34->49         started        51 31839b57a4f11171d6abc8bbc4451ee4.exe 34->51         started        61 4 other processes 34->61 97 C:\Users\user\AppData\Local\Temp\...\283E.tmp, PE32 38->97 dropped 53 283E.tmp 38->53         started        165 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 40->165 167 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 40->167 169 Modifies the context of a thread in another process (thread injection) 40->169 171 Injects a PE file into a foreign processes 40->171 55 EB51.exe 5 40->55         started        139 195.10.205.16 TSSCOM-ASRU Russian Federation 42->139 141 5.42.65.101 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 42->141 143 10 other IPs or domains 42->143 99 C:\Users\user\AppData\...\IAegBVmZpydY.exe, PE32 42->99 dropped 173 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->173 175 Found many strings related to Crypto-Wallets (likely being stolen) 42->175 177 Tries to harvest and steal browser information (history, passwords, etc) 42->177 179 2 other signatures 42->179 57 conhost.exe 42->57         started        59 conhost.exe 42->59         started        63 3 other processes 42->63 file14 signatures15 process16 file17 123 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 45->123 dropped 235 Multi AV Scanner detection for dropped file 45->235 65 tuc3.tmp 45->65         started        237 Injects a PE file into a foreign processes 49->237 67 toolspub2.exe 49->67         started        239 Detected unpacking (changes PE section rights) 51->239 241 Detected unpacking (overwrites its own PE header) 51->241 243 UAC bypass detected (Fodhelper) 51->243 251 2 other signatures 51->251 70 283E.exe 53->70         started        125 C:\Users\user\AppData\Local\...\XsdType.exe, PE32+ 55->125 dropped 245 Found many strings related to Crypto-Wallets (likely being stolen) 55->245 127 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 61->127 dropped 129 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 61->129 dropped 131 C:\Windows\System32\drivers\etc\hosts, ASCII 61->131 dropped 247 Modifies the hosts file 61->247 249 Adds a directory exclusion to Windows Defender 61->249 73 Broom.exe 61->73         started        signatures18 process19 file20 75 tuc3.exe 65->75         started        181 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 67->181 183 Maps a DLL or memory area into another process 67->183 185 Checks if the current machine is a virtual machine (disk enumeration) 67->185 187 Creates a thread in another existing process (thread injection) 67->187 103 C:\Users\user\AppData\Local\Temp\...\283E.tmp, PE32 70->103 dropped 78 283E.tmp 70->78         started        189 Multi AV Scanner detection for dropped file 73->189 signatures21 process22 file23 105 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 75->105 dropped 80 tuc3.tmp 75->80         started        107 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 78->107 dropped 109 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 78->109 dropped 111 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 78->111 dropped 113 12 other files (11 malicious) 78->113 dropped process24 file25 83 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 80->83 dropped 85 C:\Users\user\AppData\Local\...\_isdecmp.dll, PE32 80->85 dropped 87 C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32 80->87 dropped 89 13 other files (12 malicious) 80->89 dropped
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2023-11-26 17:30:56 UTC
File Type:
PE (Exe)
AV detection:
21 of 23 (91.30%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:xworm family:zgrat botnet:@ytlogsbot botnet:livetraffic backdoor discovery evasion infostealer rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Modifies data under HKEY_USERS
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Checks for VirtualBox DLLs, possible anti-VM trick
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Stops running service(s)
Detect Xworm Payload
Detect ZGRat V1
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Xworm
ZGRat
Malware Config
C2 Extraction:
http://194.49.94.210/fks/index.php
194.169.175.235:42691
personal-singing.gl.at.ply.gg:32927
195.10.205.16:2245
Unpacked files
SH256 hash:
eaa6d13d610e89b2fdedafd985d58abac85a3193c0701ded97c3c77e2a401da4
MD5 hash:
0d549c3b2dec6c12d9cc2f2e13b926b5
SHA1 hash:
1718b8cba593cff40338cd46a640b2024f033750
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_no_import_table
Description:Detect pe file that no import table
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments