MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ee8b0e0f159d28b8bdf306b5ae9fef26379525cb6f8d07d8855963ceb6a9f7d6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: ee8b0e0f159d28b8bdf306b5ae9fef26379525cb6f8d07d8855963ceb6a9f7d6
SHA3-384 hash: 8610da51cfc9a485a81ab0691e21c1ddc09460ec42768309e4b876b8b7f543379f52198cfb597c53cd4eb226aef7c891
SHA1 hash: 452b301b3a9602a937c9710bd6d4570a2cb41eb6
MD5 hash: 44043fbb9d6d08a437d8301fc7f8bab4
humanhash: london-angel-kilo-freddie
File name:44043fbb9d6d08a437d8301fc7f8bab4.exe
Download: download sample
Signature RedLineStealer
File size:239'104 bytes
First seen:2022-01-31 02:50:44 UTC
Last seen:2022-01-31 05:24:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 9422d8f1b75bb5b0336087bbf87775ee (2 x ArkeiStealer, 1 x RedLineStealer, 1 x DarkWatchman)
ssdeep 3072:0J/SY0AdknWvj3ig5zyhLtawAEkqjSciRe4imZVggjcGkNIVqI:0JaY0JYShBawAEKe4i07ITsq
TLSH T1AB34BFE0F683C072C052367188F9CBA19A7EBF21D963CA433B79176E6E712D04A5635D
File icon (PE):PE icon
dhash icon fcfcb4b4b494d9c9 (5 x RedLineStealer, 3 x RaccoonStealer, 3 x ArkeiStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
62.113.119.74:7276

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
62.113.119.74:7276 https://threatfox.abuse.ch/ioc/370931/

Intelligence


File Origin
# of uploads :
2
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
44043fbb9d6d08a437d8301fc7f8bab4.exe
Verdict:
Suspicious activity
Analysis date:
2022-01-31 03:16:32 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
DNS request
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Sending an HTTP POST request
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending a custom TCP request
Сreating synchronization primitives
Sending an HTTP GET request
Unauthorized injection to a recently created process
Query of malicious DNS domain
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CPUID_Instruction
MeasuringTime
EvasionGetTickCount
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.CrypterX
Status:
Malicious
First seen:
2022-01-31 02:51:09 UTC
File Type:
PE (Exe)
Extracted files:
29
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
SmokeLoader
Malware Config
C2 Extraction:
http://host-data-coin-11.com/
http://file-coin-host-12.com/
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe ee8b0e0f159d28b8bdf306b5ae9fef26379525cb6f8d07d8855963ceb6a9f7d6

(this sample)

  
Delivery method
Distributed via web download

Comments