MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f34b2578e33e5f9e9b858f85a4cecd84cc78e5b41f1c31934aaee33801248e33. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 10 File information Comments

SHA256 hash: f34b2578e33e5f9e9b858f85a4cecd84cc78e5b41f1c31934aaee33801248e33
SHA3-384 hash: 54098e67b6bdb0379973db16be1e5cf2a8bfce79a27be554e1e23cfeba37c560b3f3af0add5502fa6f87ee92a40b9db5
SHA1 hash: e55d3b7637e4d656f28240205da6ccec5676d4b3
MD5 hash: fa553b48b1412dcce06dae51ceca3f68
humanhash: wolfram-earth-fillet-oregon
File name:fa553b48b1412dcce06dae51ceca3f68.exe
Download: download sample
Signature RedLineStealer
File size:1'646'080 bytes
First seen:2023-10-25 13:15:44 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:dyGNjU6B97+pNHZddAb3Vr23WM10PpeRl8BD2PWKSRoMpEAbPrYzbDXK4:44HCvHHdyh23WM1Mp+l8BKgopAbTAb
TLSH T19A752322FBC08537DDB3077074F706DB3534F559DC91836B622A9C2E5CA2A8AA071B5B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://195.123.218.98/

Intelligence


File Origin
# of uploads :
1
# of downloads :
340
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
fa553b48b1412dcce06dae51ceca3f68.exe
Verdict:
Malicious activity
Analysis date:
2023-10-25 13:23:17 UTC
Tags:
stealc stealer redline amadey botnet trojan loader smoke opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching a service
Сreating synchronization primitives
Creating a file
Creating a window
Launching cmd.exe command interpreter
Searching for synchronization primitives
Running batch commands
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, RedLin
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1331891 Sample: s8jSXrUahb.exe Startdate: 25/10/2023 Architecture: WINDOWS Score: 100 171 Found malware configuration 2->171 173 Malicious sample detected (through community Yara rule) 2->173 175 Antivirus detection for URL or domain 2->175 177 19 other signatures 2->177 14 s8jSXrUahb.exe 1 4 2->14         started        17 explothe.exe 2->17         started        process3 file4 139 C:\Users\user\AppData\Local\...\DU7Zr67.exe, PE32 14->139 dropped 141 C:\Users\user\AppData\Local\...\7xW8Kk57.exe, PE32 14->141 dropped 19 DU7Zr67.exe 1 4 14->19         started        process5 file6 105 C:\Users\user\AppData\Local\...\LF0bO81.exe, PE32 19->105 dropped 107 C:\Users\user\AppData\Local\...\6ug4lI7.exe, PE32 19->107 dropped 179 Antivirus detection for dropped file 19->179 181 Multi AV Scanner detection for dropped file 19->181 183 Machine Learning detection for dropped file 19->183 23 LF0bO81.exe 1 4 19->23         started        27 6ug4lI7.exe 19->27         started        signatures7 process8 file9 121 C:\Users\user\AppData\Local\...\SG9Aa61.exe, PE32 23->121 dropped 123 C:\Users\user\AppData\Local\...\5zu8Wo2.exe, PE32 23->123 dropped 205 Antivirus detection for dropped file 23->205 207 Machine Learning detection for dropped file 23->207 29 SG9Aa61.exe 1 4 23->29         started        33 5zu8Wo2.exe 23->33         started        209 Multi AV Scanner detection for dropped file 27->209 signatures10 process11 file12 133 C:\Users\user\AppData\Local\...\hU5KH15.exe, PE32 29->133 dropped 135 C:\Users\user\AppData\Local\...\4Rv696gy.exe, PE32 29->135 dropped 241 Antivirus detection for dropped file 29->241 243 Multi AV Scanner detection for dropped file 29->243 245 Machine Learning detection for dropped file 29->245 35 hU5KH15.exe 1 4 29->35         started        39 4Rv696gy.exe 29->39         started        137 C:\Users\user\AppData\Local\...\explothe.exe, PE32 33->137 dropped 41 explothe.exe 33->41         started        signatures13 process14 dnsIp15 109 C:\Users\user\AppData\Local\...\WB2Gx31.exe, PE32 35->109 dropped 111 C:\Users\user\AppData\Local\...\3NO19ps.exe, PE32 35->111 dropped 185 Antivirus detection for dropped file 35->185 187 Multi AV Scanner detection for dropped file 35->187 189 Machine Learning detection for dropped file 35->189 44 3NO19ps.exe 35->44         started        47 WB2Gx31.exe 1 4 35->47         started        191 Writes to foreign memory regions 39->191 193 Allocates memory in foreign processes 39->193 195 Injects a PE file into a foreign processes 39->195 50 AppLaunch.exe 39->50         started        157 77.91.124.1 ECOTEL-ASRU Russian Federation 41->157 113 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 41->113 dropped 115 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 41->115 dropped 197 Creates an undocumented autostart registry key 41->197 199 Uses schtasks.exe or at.exe to add and modify task schedules 41->199 53 cmd.exe 41->53         started        55 schtasks.exe 41->55         started        57 rundll32.exe 41->57         started        file16 signatures17 process18 dnsIp19 211 Antivirus detection for dropped file 44->211 213 Machine Learning detection for dropped file 44->213 215 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 44->215 223 4 other signatures 44->223 59 explorer.exe 31 26 44->59 injected 147 C:\Users\user\AppData\Local\...\2Ub4228.exe, PE32 47->147 dropped 149 C:\Users\user\AppData\Local\...\1Dx47hT1.exe, PE32 47->149 dropped 217 Multi AV Scanner detection for dropped file 47->217 64 1Dx47hT1.exe 47->64         started        66 2Ub4228.exe 47->66         started        155 77.91.124.86 ECOTEL-ASRU Russian Federation 50->155 219 Found many strings related to Crypto-Wallets (likely being stolen) 50->219 221 Tries to harvest and steal browser information (history, passwords, etc) 50->221 68 conhost.exe 53->68         started        70 cmd.exe 53->70         started        72 cacls.exe 53->72         started        76 4 other processes 53->76 74 conhost.exe 55->74         started        file20 signatures21 process22 dnsIp23 161 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 59->161 163 77.91.68.249 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 59->163 165 3 other IPs or domains 59->165 125 C:\Users\user\AppData\Local\Temp\CA57.exe, PE32 59->125 dropped 127 C:\Users\user\AppData\Local\Temp\A384.exe, PE32+ 59->127 dropped 129 C:\Users\user\AppData\Local\Temp\98D.exe, PE32 59->129 dropped 131 8 other malicious files 59->131 dropped 225 System process connects to network (likely due to code injection or exploit) 59->225 227 Benign windows process drops PE files 59->227 229 Found many strings related to Crypto-Wallets (likely being stolen) 59->229 78 6EC.exe 59->78         started        82 98D.exe 59->82         started        84 cmd.exe 59->84         started        93 2 other processes 59->93 231 Contains functionality to inject code into remote processes 64->231 233 Writes to foreign memory regions 64->233 235 Allocates memory in foreign processes 64->235 86 AppLaunch.exe 9 1 64->86         started        88 AppLaunch.exe 64->88         started        237 Multi AV Scanner detection for dropped file 66->237 239 Injects a PE file into a foreign processes 66->239 90 AppLaunch.exe 12 66->90         started        file24 signatures25 process26 dnsIp27 143 C:\Users\user\AppData\Local\...\iP6ko8tp.exe, PE32 78->143 dropped 145 C:\Users\user\AppData\Local\...\6Gi14eT.exe, PE32 78->145 dropped 247 Antivirus detection for dropped file 78->247 249 Machine Learning detection for dropped file 78->249 95 iP6ko8tp.exe 78->95         started        251 Multi AV Scanner detection for dropped file 82->251 99 conhost.exe 84->99         started        253 Modifies windows update settings 86->253 255 Disable Windows Defender notifications (registry) 86->255 257 Disable Windows Defender real time protection (registry) 86->257 259 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 88->259 261 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 88->261 159 193.233.255.73 FREE-NET-ASFREEnetEU Russian Federation 90->159 file28 signatures29 process30 file31 151 C:\Users\user\AppData\Local\...\rk1Pb3LR.exe, PE32 95->151 dropped 153 C:\Users\user\AppData\Local\...\5FE28tx.exe, PE32 95->153 dropped 167 Antivirus detection for dropped file 95->167 169 Machine Learning detection for dropped file 95->169 101 rk1Pb3LR.exe 95->101         started        signatures32 process33 file34 117 C:\Users\user\AppData\Local\...\mW5Li2AE.exe, PE32 101->117 dropped 119 C:\Users\user\AppData\Local\...\4wA935Ke.exe, PE32 101->119 dropped 201 Antivirus detection for dropped file 101->201 203 Machine Learning detection for dropped file 101->203 signatures35
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-10-25 13:17:18 UTC
File Type:
PE (Exe)
Extracted files:
226
AV detection:
19 of 23 (82.61%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:amadey family:dcrat family:glupteba family:redline family:smokeloader botnet:grome botnet:kinza botnet:up3 botnet:uwiz backdoor brand:google discovery dropper evasion infostealer loader persistence phishing rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Stops running service(s)
Amadey
DcRat
Detected google phishing page
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
ae5c0ed5cf5ed08c6f2bdc1f5ece35f2d6ac99ac3f2e4f7a82b83cf70e42e040
MD5 hash:
bdfaa7314af220b0471a830c4ced06a8
SHA1 hash:
1d12384de26f9577ad8e413cee354fc5a7d4812f
SH256 hash:
a3406e4cf593bec53d12367eb0fc91412dd87f9ffb6f496a3670ae20508c0cc2
MD5 hash:
6eb5686c05cfb58e5a5cdf81a28e7d2c
SHA1 hash:
c2951cb33b8f93a9e573ed50bcd43ca713bd4a9a
Detections:
win_smokeloader_a2
SH256 hash:
4277eadcba349db607823b818407118846e1e05a07a4f76ed48f970afc26e7a6
MD5 hash:
6c8738e9a62f22ff1a5d87c884129e95
SHA1 hash:
0487ebac0767fbca64af1351e44b4060c6b6a34a
Detections:
Amadey win_amadey_auto
SH256 hash:
305fbfadd61ee76212200e44a375224e7b5e8609bd24ba162908c1686c789a00
MD5 hash:
991310da650abe281c1f99d8c0ccc6a2
SHA1 hash:
92cce27ae4379932307e4a2da413f1d1a81e5df6
SH256 hash:
fc1e3131c4b7e1789ca818275a978b59c73c7f2042abb5c795515e4114c36ef0
MD5 hash:
c8b31b735f6a76cb44162d9a433cf583
SHA1 hash:
8f00524893f86d29e192c2382c98189dc98f2170
SH256 hash:
f34b2578e33e5f9e9b858f85a4cecd84cc78e5b41f1c31934aaee33801248e33
MD5 hash:
fa553b48b1412dcce06dae51ceca3f68
SHA1 hash:
e55d3b7637e4d656f28240205da6ccec5676d4b3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:redline_stealer_2
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:win_redline_stealer_bytecodes_sep_203
Author:Matthew @embee_research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe f34b2578e33e5f9e9b858f85a4cecd84cc78e5b41f1c31934aaee33801248e33

(this sample)

  
Delivery method
Distributed via web download

Comments