MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f2f9785308bb396f5eb8c14e746228d3298a5984313eff79e0bb0b2f417abefc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 7 YARA 6 File information Comments

SHA256 hash: f2f9785308bb396f5eb8c14e746228d3298a5984313eff79e0bb0b2f417abefc
SHA3-384 hash: b096399847f51837e0f7a6a951d653041f5fed860e6c2f29010f34710d8b28468a42f98dc956b1d506461ee5cd7ad4da
SHA1 hash: 1451af5014e01196929bd17191f929799e31eed6
MD5 hash: 0bea974fca09703496dcca41ce759790
humanhash: sierra-mars-winter-apart
File name:F2F9785308BB396F5EB8C14E746228D3298A5984313EF.exe
Download: download sample
Signature RedLineStealer
File size:3'668'639 bytes
First seen:2021-09-30 22:25:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer)
ssdeep 98304:xXCvLUBsgHOHhAy6nPmPL4OOPAVAoK0ct+Gv9:xULUCguHayOPAKEcg49
Threatray 573 similar samples on MalwareBazaar
TLSH T19E06331137989DF3DD95B235BB457FB0B07C83A90AB44897B7A4A90C5F3F846922B42C
File icon (PE):PE icon
dhash icon 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
37.230.112.47:49799

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
37.230.112.47:49799 https://threatfox.abuse.ch/ioc/228889/
185.92.73.84:80 https://threatfox.abuse.ch/ioc/229044/
http://94.158.245.135/ https://threatfox.abuse.ch/ioc/229045/
45.131.46.129:12509 https://threatfox.abuse.ch/ioc/229046/
185.154.13.159:34854 https://threatfox.abuse.ch/ioc/229048/
http://185.215.113.25/f6vskbW/index.php https://threatfox.abuse.ch/ioc/229061/
77.232.36.199:32336 https://threatfox.abuse.ch/ioc/229067/

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
F2F9785308BB396F5EB8C14E746228D3298A5984313EF.exe
Verdict:
No threats detected
Analysis date:
2021-09-30 22:27:23 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Result
Threat name:
RedLine SmokeLoader Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to steal Chrome passwords or cookies
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 494779 Sample: F2F9785308BB396F5EB8C14E746... Startdate: 01/10/2021 Architecture: WINDOWS Score: 100 88 staticimg.youtuuee.com 2->88 90 live.goatgame.live 2->90 92 cdn.discordapp.com 2->92 120 Antivirus detection for URL or domain 2->120 122 Multi AV Scanner detection for submitted file 2->122 124 Yara detected SmokeLoader 2->124 126 8 other signatures 2->126 11 F2F9785308BB396F5EB8C14E746228D3298A5984313EF.exe 16 2->11         started        14 dwfevgh 2->14         started        signatures3 process4 file5 62 C:\Users\user\AppData\...\setup_install.exe, PE32 11->62 dropped 64 C:\Users\user\AppData\...\Tue23cd64d60a5c.exe, PE32 11->64 dropped 66 C:\Users\user\AppData\...\Tue23ca7bd0b6.exe, PE32 11->66 dropped 68 11 other files (6 malicious) 11->68 dropped 17 setup_install.exe 1 11->17         started        130 Detected unpacking (changes PE section rights) 14->130 132 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 14->132 134 Maps a DLL or memory area into another process 14->134 136 2 other signatures 14->136 signatures6 process7 dnsIp8 70 hsiens.xyz 104.21.87.76, 49754, 80 CLOUDFLARENETUS United States 17->70 72 127.0.0.1 unknown unknown 17->72 116 Performs DNS queries to domains with low reputation 17->116 118 Adds a directory exclusion to Windows Defender 17->118 21 cmd.exe 1 17->21         started        23 cmd.exe 17->23         started        25 cmd.exe 17->25         started        27 7 other processes 17->27 signatures9 process10 signatures11 30 Tue239401d669773.exe 21->30         started        33 Tue23ca7bd0b6.exe 23->33         started        36 Tue2385d3a4fc.exe 25->36         started        128 Adds a directory exclusion to Windows Defender 27->128 38 Tue2306d172d6d40c.exe 27->38         started        40 Tue23018eb3971a67a8.exe 1 13 27->40         started        43 Tue23cd64d60a5c.exe 27->43         started        45 3 other processes 27->45 process12 dnsIp13 138 Detected unpacking (changes PE section rights) 30->138 140 Machine Learning detection for dropped file 30->140 160 4 other signatures 30->160 47 explorer.exe 30->47 injected 78 2 other IPs or domains 33->78 142 Detected unpacking (overwrites its own PE header) 33->142 144 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 33->144 146 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 33->146 148 Tries to steal Crypto Currency Wallets 33->148 74 37.0.8.119, 49798, 49809, 49843 WKD-ASIE Netherlands 36->74 80 4 other IPs or domains 36->80 150 Multi AV Scanner detection for dropped file 36->150 152 May check the online IP address of the machine 36->152 162 2 other signatures 36->162 82 5 other IPs or domains 38->82 154 Antivirus detection for dropped file 38->154 156 Performs DNS queries to domains with low reputation 38->156 84 5 other IPs or domains 40->84 60 C:\Users\user\AppData\...\aaa_v013[1].dll, DOS 40->60 dropped 158 Contains functionality to steal Chrome passwords or cookies 40->158 86 2 other IPs or domains 43->86 76 eduarroma.tumblr.com 74.114.154.18, 443, 49757 AUTOMATTICUS Canada 45->76 52 Tue23923d520ac4.exe 45->52         started        54 WerFault.exe 45->54         started        file14 signatures15 process16 dnsIp17 94 thegymmum.com 47->94 96 renatazarazua.com 47->96 104 4 other IPs or domains 47->104 58 C:\Users\user\AppData\Roaming\dwfevgh, PE32 47->58 dropped 106 System process connects to network (likely due to code injection or exploit) 47->106 108 Benign windows process drops PE files 47->108 110 Hides that the sample has been downloaded from the Internet (zone.identifier) 47->110 98 live.goatgame.live 52->98 100 cdn.discordapp.com 52->100 102 api.ip.sb 52->102 56 conhost.exe 52->56         started        file18 112 May check the online IP address of the machine 98->112 114 Performs DNS queries to domains with low reputation 98->114 signatures19 process20
Threat name:
Win32.Trojan.ArkeiStealer
Status:
Malicious
First seen:
2021-08-25 14:56:46 UTC
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar botnet:706 botnet:pub2 aspackv2 backdoor discovery evasion infostealer spyware stealer themida trojan
Behaviour
Checks SCSI registry key(s)
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Vidar Stealer
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Vidar
Malware Config
C2 Extraction:
http://aucmoney.com/upload/
http://thegymmum.com/upload/
http://atvcampingtrips.com/upload/
http://kuapakualaman.com/upload/
http://renatazarazua.com/upload/
http://nasufmutlu.com/upload/
185.92.73.84:80
https://eduarroma.tumblr.com/
Unpacked files
SH256 hash:
a18e5d223da775448e2e111101fe1f4ab919be801fd435d3a278718aa5e6ccba
MD5 hash:
0c6cae115465a83f05d3ff391fd009ac
SHA1 hash:
066ea93bb540ae4be0d2e522d4bb59eec74053ad
SH256 hash:
9b5923d26248adde4546d4421275f7b0ac36e4e2c4af232d367563bca7cf5209
MD5 hash:
3093c62cf5c8c754576a62c8d173b11c
SHA1 hash:
468210c7bc85627a27a2b10da0580c119e0ec3d8
SH256 hash:
59c8b228088a6a89dfd12a9f2ee3b4b35ba5c11d22917e4794c8c40f607ccf12
MD5 hash:
594093a4765e2444ce9f5b064dc857ef
SHA1 hash:
32e65e3bf804a2abfa94281933fd5b5a0d23a30d
SH256 hash:
771879a5daba9c1534171c0c3179008c0fde3629582b4c9412a10ee2d50b627a
MD5 hash:
ae0845f56193eedc564b4a1bf6bb3b74
SHA1 hash:
119c61acd1499c1e06409a9405c0605f92255764
SH256 hash:
60477c5c0c4033440c08c3e4f25c369abe008468c7f2423333ad28f0ca41ae3c
MD5 hash:
af605ceb0187675657f0425c40c32d31
SHA1 hash:
ac7dd722fab4b8d7c47f7e4bbd27ea79eb98427a
SH256 hash:
bb96136d3dc584b776fd7f67d30dfc21a5113f2d31011ea107bc216a9e70755f
MD5 hash:
d729d6dfd720d64e2edcfa2b265c9563
SHA1 hash:
a1f1fe6d49c8b390cd7e01b0384a4cbc29539b4b
SH256 hash:
785f25b675bf841ef74c654869148a7a52043dc4f0a9b47411d56a7a653acfbc
MD5 hash:
c2845189a6070d89ce34799753823b63
SHA1 hash:
95cc359e043d7aa6b32e1b5f02bfeda413c6aac2
SH256 hash:
05942fe67632d7cb440fd1f31bd55cfc8416bdab4da6ed8d84e8d3fd16c3f5d6
MD5 hash:
5fbf56cf05175a08ebbfd3ab8c29ab9e
SHA1 hash:
7412ee83a7568b1f6024ba4e1277e298d76e8738
SH256 hash:
e6dce7d1ee0bbc5da1d5f17796fe94daf3235d1a01bf5add8ba0df98752863c0
MD5 hash:
e6db3b05b789c394371672701ea696a8
SHA1 hash:
389c9e423d3d72ad8acf4b37f1550f83b19286a2
SH256 hash:
818b4184eadad7084d1153e24e3931971b7275183c5982435fd85afd4d671c9b
MD5 hash:
37feb11bed6a53b061bcafac562dfdaf
SHA1 hash:
052c67f933aaf9560d177acffd0ee9d0ed12063f
SH256 hash:
5a5fa2828bff9cfac637c0ed46878fe08cee23a899178ef626a106905210ec6d
MD5 hash:
1ba75015c1ca7cd3fe24de45b3443341
SHA1 hash:
69b9de23262cadc698906014eff387e391b2c5fd
SH256 hash:
1345f6aeda95dfe3ec15e8a1018b7251a119843f3c9b371ef944e09ec9bff68f
MD5 hash:
2c6ae027e26ff1deea0d2bd72b578e03
SHA1 hash:
6288589d0db85dd4a26dbcb5bf4d56b490f45cc6
SH256 hash:
f2f9785308bb396f5eb8c14e746228d3298a5984313eff79e0bb0b2f417abefc
MD5 hash:
0bea974fca09703496dcca41ce759790
SHA1 hash:
1451af5014e01196929bd17191f929799e31eed6
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation
Author:ditekSHen
Description:Detects executables containing potential Windows Defender anti-emulation checks
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MALWARE_Win_Vidar
Author:ditekSHen
Description:Detects Vidar / ArkeiStealer
Rule name:RedOctoberPluginCollectInfo
Rule name:Vidar
Author:kevoreilly
Description:Vidar Payload

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments