MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ec023d6b5c815745264f62bcd9a73633489ae3ed505c22f1764388493ffc4cc6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 2 YARA 7 File information Comments

SHA256 hash: ec023d6b5c815745264f62bcd9a73633489ae3ed505c22f1764388493ffc4cc6
SHA3-384 hash: 5199cd9db2d6198d8a18a370fb0290a4b9948d44dafb04317b0848747807d9aa904b27d534203ced8ada3fcd62c242ca
SHA1 hash: c6bca49bf33bf94589a7c4fa7e258c1d214e2a6e
MD5 hash: aafdd6064e82ee1fc554f9278ec21c33
humanhash: lemon-social-alaska-rugby
File name:aafdd6064e82ee1fc554f9278ec21c33.exe
Download: download sample
Signature RedLineStealer
File size:15'382'297 bytes
First seen:2021-12-10 21:26:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 393216:J9zKlDDptfYL/PdBatBROhOGz/cSZw7hbq1+IHiJkX:JtKl3YzdBkHrOm7YxHx
Threatray 799 similar samples on MalwareBazaar
TLSH T190F6331080B6F553C677C738DB6F4ACCC4359AC72D2CFBA2032B2665BE60342956769B
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://185.163.204.230/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.163.204.230/ https://threatfox.abuse.ch/ioc/273518/
185.215.113.82:31104 https://threatfox.abuse.ch/ioc/273846/

Intelligence


File Origin
# of uploads :
1
# of downloads :
256
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aafdd6064e82ee1fc554f9278ec21c33.exe
Verdict:
No threats detected
Analysis date:
2021-12-10 21:31:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Launching a process
Creating a window
Creating a process with a hidden window
Unauthorized injection to a recently created process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon RedLine SmokeLoader Socelars Vid
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Execution Of Other File Type Than .exe
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected AntiVM3
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar
Yara detected Vidar stealer
Yara detected WebBrowserPassView password recovery tool
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 538057 Sample: MPheS9fYdc.exe Startdate: 10/12/2021 Architecture: WINDOWS Score: 100 83 ip-api.com 208.95.112.1, 49789, 80 TUT-ASUS United States 2->83 85 s3.pl-waw.scw.cloud 151.115.10.1, 49788, 80 OnlineSASFR United Kingdom 2->85 87 7 other IPs or domains 2->87 129 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->129 131 Found malware configuration 2->131 133 Antivirus detection for URL or domain 2->133 135 32 other signatures 2->135 11 MPheS9fYdc.exe 10 2->11         started        14 WmiPrvSE.exe 2->14         started        signatures3 process4 file5 79 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->79 dropped 16 setup_installer.exe 28 11->16         started        process6 file7 53 C:\Users\user\AppData\...\setup_install.exe, PE32 16->53 dropped 55 C:\Users\user\AppData\...\Wed07f2f76d7ae.exe, PE32 16->55 dropped 57 C:\Users\user\...\Wed07eaa3b4e4812b1.exe, PE32 16->57 dropped 59 23 other files (13 malicious) 16->59 dropped 19 setup_install.exe 1 16->19         started        process8 signatures9 137 Adds a directory exclusion to Windows Defender 19->137 139 Disables Windows Defender (via service or powershell) 19->139 22 cmd.exe 19->22         started        24 cmd.exe 1 19->24         started        26 cmd.exe 19->26         started        28 16 other processes 19->28 process10 signatures11 31 Wed07b38bab094.exe 22->31         started        35 Wed0713d89fc372c9.exe 74 24->35         started        38 Wed0714a7e347b5bedc.exe 26->38         started        141 Adds a directory exclusion to Windows Defender 28->141 143 Disables Windows Defender (via service or powershell) 28->143 40 Wed07bf5d2379fe90cd0.exe 28->40         started        42 Wed07c12a0463085d.exe 28->42         started        44 Wed070595b0b83ed474.exe 28->44         started        46 11 other processes 28->46 process12 dnsIp13 95 6 other IPs or domains 31->95 103 Query firmware table information (likely to detect VMs) 31->103 105 Tries to detect sandboxes and other dynamic analysis tools (window names) 31->105 121 2 other signatures 31->121 97 2 other IPs or domains 35->97 73 12 other files (none is malicious) 35->73 dropped 107 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 35->107 123 3 other signatures 35->123 89 2.56.59.42, 49776, 49791, 80 GBTCLOUDUS Netherlands 38->89 91 212.193.30.29 SPD-NETTR Russian Federation 38->91 99 3 other IPs or domains 38->99 61 C:\Users\user\...61iceProcessX64[1].bmp, PE32+ 38->61 dropped 75 2 other files (1 malicious) 38->75 dropped 109 May check the online IP address of the machine 38->109 111 Disable Windows Defender real time protection (registry) 38->111 113 Detected unpacking (changes PE section rights) 40->113 115 Detected unpacking (overwrites its own PE header) 40->115 125 2 other signatures 40->125 48 Wed07bf5d2379fe90cd0.exe 40->48         started        93 one-mature-tube.me 104.21.39.198, 443, 49801 CLOUDFLARENETUS United States 42->93 63 9fbf7fe8-c9ad-494e-a100-c0aaf15f4189.exe, PE32 42->63 dropped 65 9c203428-09ac-4527-9846-f466cb331250.exe, PE32 42->65 dropped 67 7ecc7254-ba94-4f02-a4ff-2d11d8e10026.exe, PE32 42->67 dropped 77 2 other files (none is malicious) 42->77 dropped 127 2 other signatures 44->127 101 4 other IPs or domains 46->101 69 C:\Users\user\...\Wed071f5c72e56397c.tmp, PE32 46->69 dropped 71 C:\Users\user\...\Wed074e758cc1d43d.tmp, PE32 46->71 dropped 117 Obfuscated command line found 46->117 119 Tries to detect sandboxes / dynamic malware analysis system (registry check) 46->119 51 Wed07eaa3b4e4812b1.exe 46->51         started        file14 signatures15 process16 dnsIp17 81 ad-postback.biz 192.236.195.164, 80 HOSTWINDSUS United States 48->81
Threat name:
Win32.Hacktool.NirSoftPT
Status:
Suspicious
First seen:
2021-12-08 19:28:25 UTC
File Type:
PE (Exe)
Extracted files:
423
AV detection:
32 of 45 (71.11%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:glupteba family:raccoon family:redline family:socelars family:vidar botnet:03.12_build_3 botnet:4da27d123a577c68e42716053343dd3f8da508a2 aspackv2 discovery dropper evasion infostealer loader persistence spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Kills process with taskkill
Modifies Internet Explorer settings
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Drops Chrome extension
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks BIOS information in registry
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
ASPack v2.12-2.42
Blocklisted process makes network request
Downloads MZ/PE file
Drops file in Drivers directory
Executes dropped EXE
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies boot configuration data using bcdedit
NirSoft WebBrowserPassView
Nirsoft
Glupteba
Modifies Windows Defender Real-time Protection settings
Process spawned unexpected child process
Raccoon
RedLine
RedLine Payload
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Windows security bypass
Malware Config
C2 Extraction:
45.9.20.221:15590
http://www.wgqpw.com/
Unpacked files
SH256 hash:
1908cac443610b332e8adfc72481d2a225b72e679ff468d1643782e9c2d96e7c
MD5 hash:
60d12965e7dd763580b316f0743731c6
SHA1 hash:
54b2f29a834a6f9e931a19e3f53c27a132e19c19
SH256 hash:
3d966268571cf0a83f327df99ffd7441ffe65ad098f1db2fff8dd6a5d5233796
MD5 hash:
541501763132091ca1571883622b2c81
SHA1 hash:
17f0073da00f8511abc7b4dd5d018f043c0c5489
SH256 hash:
9c00e935a41bb1dc0b2b65ac18c0a1be05bdc555676e7eb8a830590b52e55436
MD5 hash:
e7526d8f9a8f888b75b85f9a1ebae3dc
SHA1 hash:
79ca1cbf3184302db8defa924c43295106021c7e
SH256 hash:
b3a243149949327349c4fce0bd153e477de376b2ed146330d4345b60a3925d63
MD5 hash:
5edd166a963a028a82cbe38dad7fb7ad
SHA1 hash:
4a9e4f8b7820f5c5859f1ae61d4ec8697f4b43f6
SH256 hash:
dd93d89ca9f67e45c7c78ecff47054fa56b1d97648c4c9d24ebda86738e6195b
MD5 hash:
1a52990f87dbe56ad03afc7849ec66b7
SHA1 hash:
8a38c8fcefc409518940a77c83bc828e9706e24d
SH256 hash:
fdfcbc8cfb57a3451a3d148e50794772d477ed6cc434acc779f1f0dd63e93f4b
MD5 hash:
a6865d7dffcc927d975be63b76147e20
SHA1 hash:
28e7edab84163cc2d0c864820bef89bae6f56bf8
SH256 hash:
012c3d22b5374c4f595fcf1986bf2a67697f322f36e8bb6456809334f98f5781
MD5 hash:
8bacb64db8fb73308faefd14b863fd43
SHA1 hash:
c5bf54f8b9cc198d6d380f3ee7a74df2feadf32a
SH256 hash:
9dac78cf97a753e813b02cb654f076cdea03155bc9a98ed64ec248729ead52ec
MD5 hash:
29fa5c5ade39d4ae5a0f564949278923
SHA1 hash:
376051004220051779d97fcb44065a8724de370b
SH256 hash:
cf1ed8957d4825743d39f19529138de7131ca8f506440ddc1774f4640dffc599
MD5 hash:
ded1c6e8c89148495fc19734e47b664d
SHA1 hash:
3a444aeacd154f8d66bca8a98615765c25eb3d41
SH256 hash:
63525b0c1ef894632109c3169876b9e2ce728e38ed7f7c574021d5261d56e502
MD5 hash:
ff9b14f4f607a81117cc58916332262e
SHA1 hash:
aed4fe230075f2a067e4ac61fac117aaeb5ef6f9
SH256 hash:
fe4d165cec388ad2ce39d59c5f2ecc7432fb03613e7fda2b0713e3bd08ce19a0
MD5 hash:
5d728a032ef9770131dbed11e55561d1
SHA1 hash:
df29c2c290ca56725d241c9b9ae26061c9880319
SH256 hash:
1edf9e85f0198fe671b0faa057695f7892f130c0356886b61e134f6b4d30c9b7
MD5 hash:
c1152aded5a610f98716d9dc50eca89e
SHA1 hash:
d7f81b143b6035da1c51069214d765bc6c8ddfd6
SH256 hash:
64317ea88e4a66f651aeff17e7baa7a140836db94406b004a2ee213c6916cca5
MD5 hash:
69f7b12de72604fece6d4139a2922569
SHA1 hash:
d1a12bdc4db8f566e21be7b64c3f9d414bf08707
SH256 hash:
ee2cc85a8e1972a29ce67ab0218d5daa8fc9b67f36111c71eccaf6da05219d19
MD5 hash:
f6271f82a952f96ba9271a4a27c9f22f
SHA1 hash:
d12708b9e39a0cd06add96316b65f1668d6a1246
SH256 hash:
5505adddd3b86b94d5940c305e75d86168af44f5f405edb00484be7bcbe9e2b2
MD5 hash:
b5a301b6d727f684d9d62ff230006dc1
SHA1 hash:
be840e49732f2bac1acad150e4db15c00ae4c9e9
SH256 hash:
99f756b9eca18ac1d626962d4dc50475c44a5af4a5e19ad4cfe412ab694c7481
MD5 hash:
775b1099b59795601f45a33ec73fe5cd
SHA1 hash:
bd3719fa0c02c53c0a5b85bf7df2c95a04c8bd5b
SH256 hash:
5ba0e54a111a5f06faabe33e47fffe14f728cfd1d243251936b88c2598a8a627
MD5 hash:
7321d6deabdc8df4988f931dd444d59c
SHA1 hash:
bb3455b63c30c9ba70e791557936a6abe4f31146
SH256 hash:
5d256ad98e0bc4d17d9d87f09d54b6dc3bfb5abd0909c36e84168e6d5d9e8e80
MD5 hash:
a227ae6f9ca2827a6de2ebd9ae7eb090
SHA1 hash:
aef54455d04798c2910958c583b23d80cb20a272
SH256 hash:
c560d7faacb500f99ad5e77c05fecad550b2c9e202b0c47dd5932ee2e050c682
MD5 hash:
8430f1ca02fa83331a3dea6b0ff1a3f2
SHA1 hash:
a0e1c909b9cb759bb84d0e54eac39bf9ac5c8ad7
SH256 hash:
199bf84902c70ab6a5d8e4e649ddebdd428edfc38b1d344263bdb7c704455d2a
MD5 hash:
2239840dc7a60da412d2cfc0e3a8a85e
SHA1 hash:
93ab283446bd6acd696ecf0f13f1d6298cb4f61f
SH256 hash:
64f55d5e15b9dbbb0d6e16ffb9aceaee91ee440beef80e4cd1b74b0ded11c7c1
MD5 hash:
1404f942070e57b2ef0b6b3693f730be
SHA1 hash:
7ef83b925afb34c52627b66ad960400fbc1bf776
SH256 hash:
53a13d9b85c62c225f80677e7e84f0e4b3980c0695a7606212176326f2ee72e0
MD5 hash:
ba4548a88c431f3b9e3777e165a62f60
SHA1 hash:
412ca7d19a5bbc44fe0382a59f1bbae0eb1be44d
SH256 hash:
80552d52feb3858dd504cbea2bdf748cd20c1b4af447c49755e42c2c816021d0
MD5 hash:
026c9f3289cafee9e03021fb832c308d
SHA1 hash:
1adc1b7b5afba21b306477bb232097412ffd8f45
SH256 hash:
fb8dc0272a15b72acb0e9e4836ef4db6b888baae8ee9c40340284cbf802f3675
MD5 hash:
87a1f1791f691c79ccfee34459131f5b
SHA1 hash:
0d3e3375456dc80a57707be394e5facb3d9537bd
SH256 hash:
3e627ea5a0a3ed72c6f60b3a9c3ee0a2264cc22178ea20aba1cedb43919a60e3
MD5 hash:
ebfee6765c7e448e3ea21b40550d1a70
SHA1 hash:
08464d94727b3a9f523b93ddbaf21191c65214e5
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
ee821f8bf24cec68cced8a322129e322a9e5a20f2d92dd2f0b0827aff4711343
MD5 hash:
5eda69604c85537ab3fbaf77da60b2cb
SHA1 hash:
5d0a8f3efa0b26f52fe36eac2583ac419b6dd11d
SH256 hash:
ef6e52a139aa4e11474e1d6f14ee00cd033c5f16e1ac6a8e47d5a35c3946f101
MD5 hash:
1dce764e7e00216cb08f727f59ee7c53
SHA1 hash:
b2e81e7efe1a8fbb0ff2e006db28d1230b3a1b32
SH256 hash:
37b2a2dc3a9f8e667904af2330e8fb3b92862e868b3f254671c0262b28a091fc
MD5 hash:
a56c43ca30c31cdc3e32af12f279858a
SHA1 hash:
06cc34fbe6d3bc8acc441816bd203207f4d50cf3
SH256 hash:
600d4c625a206b221ef9c4a86895e75c6dd601f77988b9ec6d3bd957cd2cdb21
MD5 hash:
1ef97e965ce2de403ea5aaf3d3906abb
SHA1 hash:
c36c32b4712172fa9d5c06a45a85830c9351fc02
SH256 hash:
e9d024ed7e4ec3cc1951aad3a74843d3ce9d01c89e1e9413f258f9ea07aef5d4
MD5 hash:
e53ded992aa92b943c05cab27c619c1a
SHA1 hash:
3586221459a45255ebfbe2d2b531b043046eed48
SH256 hash:
a28317670367dcde38596d4cfdad7d2dc3ef33a8037067bd9bb850afd127e2c8
MD5 hash:
fc4c8bc95026f13b36a2e3612b36d5d1
SHA1 hash:
bc6fa250a6da4b66b9723534a1912439469f7dd9
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
ea5925d8ad994f0fca0a6077e7ebc851cb24a1d1028b44e367bc8c3f0b9be29d
MD5 hash:
626df0c8ab818d1838facfa6e0b5dd86
SHA1 hash:
41543c919f197e130d66f376ac82f3a6a5428864
SH256 hash:
ec023d6b5c815745264f62bcd9a73633489ae3ed505c22f1764388493ffc4cc6
MD5 hash:
aafdd6064e82ee1fc554f9278ec21c33
SHA1 hash:
c6bca49bf33bf94589a7c4fa7e258c1d214e2a6e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments