MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f06154d372fa1cd4d5e9c1d5956646c9b4dd80dab46ab1d47f057a0199f5e8f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 2 YARA 18 File information Comments

SHA256 hash: f06154d372fa1cd4d5e9c1d5956646c9b4dd80dab46ab1d47f057a0199f5e8f2
SHA3-384 hash: bc1436a7fd41e945cfe97d9987b4bd04900c7e62cdd47881bd233aa65f463c72cc11245a446ee3d1b9bbda874c2266b5
SHA1 hash: 628378162175c2518d90af6feecfa6cc864e7856
MD5 hash: b2afa477962970175bc03195b5195dbd
humanhash: green-glucose-mexico-lemon
File name:F06154D372FA1CD4D5E9C1D5956646C9B4DD80DAB46AB.exe
Download: download sample
Signature RedLineStealer
File size:5'456'730 bytes
First seen:2022-08-24 03:25:30 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xOCvLUBsggUavGgxa2TIJGIO09vco72jLRnhdfDAWGpLDdwY+ETRn87:xHLUCggWLiIO09OxDMWr9ETK
TLSH T1E746335479AAC9F9EC55E179238D7FBA587C81C907238BC377068D096F396C0A23F50A
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
37.139.129.226:81

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
37.139.129.226:81 https://threatfox.abuse.ch/ioc/844917/
46.17.101.45:7777 https://threatfox.abuse.ch/ioc/845041/

Intelligence


File Origin
# of uploads :
1
# of downloads :
328
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
F06154D372FA1CD4D5E9C1D5956646C9B4DD80DAB46AB.exe
Verdict:
No threats detected
Analysis date:
2022-08-24 03:29:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching cmd.exe command interpreter
Creating a file in the %temp% subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Running batch commands
Sending a custom TCP request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
DNS request
Creating a window
Creating a file
Sending an HTTP GET request
Query of malicious DNS domain
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
arkeistealer barys overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nymaim, RedLine, SmokeLoader, Socelars,
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Connects to a pastebin service (likely for C&C)
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Potential malicious VBS script found (suspicious strings)
Sample uses process hollowing technique
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected Nymaim
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 689231 Sample: F06154D372FA1CD4D5E9C1D5956... Startdate: 24/08/2022 Architecture: WINDOWS Score: 100 109 s.lletlee.com 2->109 135 Snort IDS alert for network traffic 2->135 137 Malicious sample detected (through community Yara rule) 2->137 139 Antivirus detection for URL or domain 2->139 141 21 other signatures 2->141 12 F06154D372FA1CD4D5E9C1D5956646C9B4DD80DAB46AB.exe 21 2->12         started        15 rundll32.exe 2->15         started        17 svchost.exe 1 2->17         started        19 6 other processes 2->19 signatures3 process4 file5 101 C:\Users\user\AppData\...\setup_install.exe, PE32 12->101 dropped 103 C:\Users\user\AppData\...\Tue11f0fa16f248.exe, PE32 12->103 dropped 105 C:\Users\user\AppData\...\Tue11e461f6e776.exe, PE32 12->105 dropped 107 16 other files (9 malicious) 12->107 dropped 21 setup_install.exe 1 12->21         started        25 Conhost.exe 12->25         started        27 rundll32.exe 15->27         started        29 Tue1175ddc284d80.exe 17->29         started        process6 dnsIp7 111 127.0.0.1 unknown unknown 21->111 113 hsiens.xyz 21->113 143 Performs DNS queries to domains with low reputation 21->143 145 Adds a directory exclusion to Windows Defender 21->145 31 cmd.exe 1 21->31         started        33 cmd.exe 21->33         started        35 cmd.exe 21->35         started        39 13 other processes 21->39 147 Writes to foreign memory regions 27->147 149 Allocates memory in foreign processes 27->149 151 Creates a thread in another existing process (thread injection) 27->151 37 svchost.exe 27->37 injected 115 172.67.221.103 CLOUDFLARENETUS United States 29->115 153 Antivirus detection for dropped file 29->153 155 Machine Learning detection for dropped file 29->155 signatures8 process9 signatures10 42 Tue115ba1c86fd3138ea.exe 4 46 31->42         started        47 Tue11666fe50ffdf29dc.exe 33->47         started        49 Tue11e461f6e776.exe 35->49         started        157 Adds a directory exclusion to Windows Defender 39->157 51 Tue11334919a582f73b4.exe 39->51         started        53 Tue115151bc370f.exe 39->53         started        55 Tue116b3a7f31d6af2.exe 39->55         started        57 7 other processes 39->57 process11 dnsIp12 119 212.193.30.115, 49734, 49752, 80 SPD-NETTR Russian Federation 42->119 121 107.182.129.251, 49735, 49758, 80 META-ASUS Reserved 42->121 125 9 other IPs or domains 42->125 89 C:\Users\user\AppData\Local\...\655[1].exe, PE32 42->89 dropped 91 C:\Users\user\AppData\Local\...\ruzki[1].exe, PE32 42->91 dropped 93 C:\Users\user\...\MalaciaHypocists[1].exe, PE32 42->93 dropped 99 21 other files (6 malicious) 42->99 dropped 159 Antivirus detection for dropped file 42->159 161 May check the online IP address of the machine 42->161 163 Machine Learning detection for dropped file 42->163 177 2 other signatures 42->177 59 mshta.exe 47->59         started        123 www.listincode.com 103.224.212.220, 443, 49732 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 49->123 127 3 other IPs or domains 49->127 61 WerFault.exe 49->61         started        129 2 other IPs or domains 51->129 165 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 51->165 167 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 53->167 64 explorer.exe 53->64 injected 169 Sample uses process hollowing technique 55->169 131 4 other IPs or domains 57->131 95 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 57->95 dropped 97 C:\Users\user\AppData\Local\...\icuin.exe, PE32 57->97 dropped 171 Potential malicious VBS script found (suspicious strings) 57->171 173 Creates processes via WMI 57->173 175 Injects a PE file into a foreign processes 57->175 66 icuin.exe 57->66         started        file13 signatures14 process15 dnsIp16 68 cmd.exe 59->68         started        133 52.168.117.173 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 61->133 71 rundll32.exe 64->71         started        73 powershell.exe 66->73         started        76 conhost.exe 66->76         started        process17 dnsIp18 87 C:\Users\user\AppData\Local\Temp\09xU.exE, PE32 68->87 dropped 78 09xU.exE 68->78         started        81 conhost.exe 68->81         started        83 taskkill.exe 68->83         started        117 13.107.4.52 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 73->117 85 conhost.exe 73->85         started        file19 process20 signatures21 179 Antivirus detection for dropped file 78->179 181 Machine Learning detection for dropped file 78->181
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2022-08-21 22:51:00 UTC
File Type:
PE (Exe)
Extracted files:
377
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
ytstealer
Score:
  10/10
Tags:
family:privateloader family:redline family:socelars family:ytstealer botnet:ani botnet:media12 botnet:she aspackv2 infostealer loader main persistence stealer upx
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Unexpected DNS network traffic destination
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
PrivateLoader
Process spawned unexpected child process
RedLine
RedLine payload
Socelars
Socelars payload
YTStealer
YTStealer payload
Malware Config
C2 Extraction:
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
135.181.129.119:4805
91.121.67.60:2151
45.142.215.47:27643
Unpacked files
SH256 hash:
9a2bd2affa4f61fddd2cf83eca1a9023d1275e71d711fee1bf78887097602193
MD5 hash:
955a84181beba0d5cebaaa096a2008fd
SHA1 hash:
4ba42cf5e19c66649ea2f9e23d26f168a9609bc2
Detections:
win_smokeloader_a2
SH256 hash:
51d1fb6c91c859ebbe0d33009feb91e61ac92c14412addfeb6e5b097d84b7b63
MD5 hash:
ca367012ebf8a17e84253413281d5e72
SHA1 hash:
9db93109d5bfb255c1997e422a2538beefdbb36e
SH256 hash:
0e2e68dc9724fc97647db64d367e7eed6ecf41b6cfe23fef257260607f86445d
MD5 hash:
91220afa4a880b7fb2d1b6a5117bf30d
SHA1 hash:
486b03728efe58dfbe19078bceb412e43eb153dd
SH256 hash:
27a9228747973ae9649e8717a2ff77916346560644e734ef2ed946f2767fb128
MD5 hash:
de1b3c28ea026c0ede620dd78199ddc5
SHA1 hash:
ee402371a36bff44c765323ccd8c7e4a56bc8d12
SH256 hash:
43da19a0f18ca201ee3f213e30699e121bbe812bb14e405344dfe43e52b95d6a
MD5 hash:
c83860b0db60b9f69468301ee2a58fca
SHA1 hash:
d826cc0323eb208e36b3e9ef00225430c6f031e1
SH256 hash:
684e26f10ac97897d71b217e1e2e4016a9547afae2830791b8405c2f7ddda23c
MD5 hash:
7d5420b628932aabddafc6f6a905865e
SHA1 hash:
bfc7ae6825a9ef8bdd2f9cc42b922219be4d584b
Detections:
win_privateloader_a0 win_privateloader_w0
SH256 hash:
f7ee5b08b5a9dcfd9e59225cc0d8816d1fa27f2b6a56064761a272b0ba807b57
MD5 hash:
2e1257523e2b034489f3aa3725fce7fe
SHA1 hash:
becee886e34121c595da484b46500cb03fc04abe
SH256 hash:
f6b233194c046109fbbe0cb460bd0b1f9da5b3325bce46170830807b14f81649
MD5 hash:
6d24eb374176bdbc3e732b84ad163e77
SHA1 hash:
b60b46ed99eee30ec65617035e4a16cfe3756153
SH256 hash:
35f7590f4b3dbf667fc7f46ea1db84777709b59ab2a2581b1654386eda9a1010
MD5 hash:
432a8e0434b0419eeb8bca51318969bd
SHA1 hash:
ae94cf7192996090f2aa69b0158230e2af3dc182
SH256 hash:
59db28937933a162481216958e8e2cf0ce46f882e1601521018638644fae8dba
MD5 hash:
db325e7dfc2266b43512b69d7c5a279f
SHA1 hash:
a45df6996f2f6051642dbceb46ec60afe6b1c969
SH256 hash:
6f18b6ce20487a802552bb99d2aa0cc37bb93d49ec1fbbd2548a0785d026a8a4
MD5 hash:
4154dc8e80d7fd73d4453bd23dc80002
SHA1 hash:
8ae7daaee8f24665eeea52e50e9079712ec3db70
SH256 hash:
50e10c1af97b5ad5ed5cbc23afef5b9a67abba2bab35bdef06065f04a70f2798
MD5 hash:
b261b808a6430543826bd39c2da6b729
SHA1 hash:
71b313e1ac2bcb037a0fc3b2657d311b2d245da0
SH256 hash:
83a3a51a0dfaf7292f9adc687200e9f0ef9477187c7b8183dfc83b77804c6fd9
MD5 hash:
0ff425ce73800835812f5f42f3889541
SHA1 hash:
6da2aada16323c1b26da5761d24fe1f18672da59
SH256 hash:
6805e04b0e21a807aec3812aa9cc5cffb9980bbf28ed8b45819037a051337784
MD5 hash:
852b5024cf0c8509795100968a3081ee
SHA1 hash:
431a6c846c8c58458ba697db021ad2a6b37e5ef0
SH256 hash:
33d85d444b0d81c3d5fffa46f65053f8381c034a8c9b39cef6511f60e6899cb7
MD5 hash:
301ab34c446683dfd6bb00ca4726f8ae
SHA1 hash:
7a82785d46c17eb50b46980414a3d674e57b506e
SH256 hash:
51083f1071cc6c67bc643417a0be92c3190a044f6cb0d913bb8afb01adc08f3f
MD5 hash:
59073d016866002414aa2c915f8d1f6e
SHA1 hash:
dc285bc11154c5d4b932514934bd16c71b2a3938
SH256 hash:
d95b8e2d8bf52369a369cf6ee5366297a8984380210d7eea29a82cf53b8501fa
MD5 hash:
4da644a647b164089629ff894110d9cf
SHA1 hash:
8f29d97853790d852203c0921c39609ee8c6b27e
SH256 hash:
642f5d31e9797e4509429807009ee2871ac9826b5b513ff229956a3d87ed1f8e
MD5 hash:
488029d7287523022a3a3c0fad808e36
SHA1 hash:
1f28a900f11d99b0f6e65cf3b1e63b0bd22f45db
SH256 hash:
04ef2fa5bad20cf169e10a490388cc7776c639b3fc597e97e6cd0152145812a4
MD5 hash:
6a40020d9f351c50c8f18172e88fa072
SHA1 hash:
099335082aee9d2029fd4f96fbfb9b60e61b68c0
SH256 hash:
3c589ad3c97688a0aea3e67a7f5d83ea00a4b8811af7685ce87614b75bfd6ad5
MD5 hash:
21a2e99ece1e33acf89b46f9ed626aff
SHA1 hash:
10cf7d10fa98e80d7c45c3ebe1dc240d4a6a6a9e
SH256 hash:
e6d5eca943199e50efc9c26412ed92bfef101255fdaaaf72efe5bc76bbd448f5
MD5 hash:
29581e0748249f11aba6a47e1c31e400
SHA1 hash:
64beec4d94de9d6e66dffbd0d9c5ccd02fdf28be
SH256 hash:
f06154d372fa1cd4d5e9c1d5956646c9b4dd80dab46ab1d47f057a0199f5e8f2
MD5 hash:
b2afa477962970175bc03195b5195dbd
SHA1 hash:
628378162175c2518d90af6feecfa6cc864e7856
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:INDICATOR_EXE_Packed_ASPack
Author:ditekSHen
Description:Detects executables packed with ASPack
Rule name:MALWARE_Win_Arechclient2
Author:ditekSHen
Description:Detects Arechclient2 RAT
Rule name:MALWARE_Win_DLInjector03
Author:ditekSHen
Description:Detects unknown loader / injector
Rule name:MALWARE_Win_DLInjector06
Author:ditekSHen
Description:Detects downloader / injector
Rule name:MALWARE_Win_OnlyLogger
Author:ditekSHen
Description:Detects OnlyLogger loader variants
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:privateloader
Author:andre@tavares.re
Description:PrivateLoader pay-per-install malware
Rule name:Privateloader_Main_Component
Description:Detects PrivateLoader Main Component
Rule name:RedLine_b
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Reference:https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force()
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:win_privateloader
Rule name:win_privateloader_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.privateloader.
Rule name:win_privateloader_w0
Author:andretavare5
Reference:https://tavares.re/blog/2022/06/06/hunting-privateloader-pay-per-install-service

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments