MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f6c47786d9564e17bab11b85ded8ac4f5c8cc9b6f3c7130a8f8a5d33f3dd6d92. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 1 File information Comments

SHA256 hash: f6c47786d9564e17bab11b85ded8ac4f5c8cc9b6f3c7130a8f8a5d33f3dd6d92
SHA3-384 hash: fd1bcf6378856d21ecc7ea3ca3c38a42e4f612bda92ad42338959754de6ba798103c9ecc6aab21a715e5fba21e749228
SHA1 hash: a557843b9e48cdb53efe362143df676531403782
MD5 hash: 26e6c04c3c084cc2b6a340c194ecf7ac
humanhash: beryllium-kentucky-mango-robert
File name:26E6C04C3C084CC2B6A340C194ECF7AC.exe
Download: download sample
Signature RedLineStealer
File size:9'195'137 bytes
First seen:2022-04-24 18:40:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 102 x GuLoader, 64 x DiamondFox)
ssdeep 196608:JyUckRCihdVqR3ysfL/BolmPYCMGL/ArWmOQc+u+Yh6rgGqix/khUq:JyAdVOSs4GA1c+uB6Mkk/
Threatray 8'150 similar samples on MalwareBazaar
TLSH T1A896338A39AE8103D1220533B517D75300EED7F1269B9B96F39E737F10A86A139FB581
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
91.213.50.241:25821

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
91.213.50.241:25821 https://threatfox.abuse.ch/ioc/532818/

Intelligence


File Origin
# of uploads :
1
# of downloads :
297
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
Launching a process
Creating a window
Searching for synchronization primitives
DNS request
Sending an HTTP GET request
Creating a process with a hidden window
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
80%
Tags:
control.exe manuscrypt overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Nymaim RedLine SmokeLoader Socelars Zeal
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to hide user accounts
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected VMProtect packer
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected AntiVM3
Yara detected Nymaim
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Yara detected Zealer Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 614597 Sample: 2k70nO2s4q.exe Startdate: 24/04/2022 Architecture: WINDOWS Score: 100 103 91.213.50.241 ASBAXETNRU unknown 2->103 105 s3.pl-waw.scw.cloud 2->105 107 2 other IPs or domains 2->107 127 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->127 129 Multi AV Scanner detection for domain / URL 2->129 131 Malicious sample detected (through community Yara rule) 2->131 133 24 other signatures 2->133 11 2k70nO2s4q.exe 10 2->11         started        14 WmiPrvSE.exe 2->14         started        signatures3 process4 file5 89 C:\Users\user\AppData\...\setup_installer.exe, PE32 11->89 dropped 16 setup_installer.exe 20 11->16         started        process6 file7 61 C:\Users\user\AppData\...\setup_install.exe, PE32 16->61 dropped 63 C:\Users\...\6261a514ea83d_Thu18e6ad10621.exe, PE32 16->63 dropped 65 C:\Users\...\6261a513c8a6f_Thu1810d438a2.exe, PE32 16->65 dropped 67 15 other files (9 malicious) 16->67 dropped 19 setup_install.exe 1 16->19         started        process8 signatures9 135 Adds a directory exclusion to Windows Defender 19->135 22 cmd.exe 19->22         started        24 cmd.exe 19->24         started        26 cmd.exe 1 19->26         started        28 11 other processes 19->28 process10 signatures11 31 6261a508e08f5_Thu184f87cb6.exe 22->31         started        34 6261a5118770b_Thu18f710a7c55.exe 24->34         started        37 6261a5025831f_Thu182f4cac4.exe 15 8 26->37         started        137 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 28->137 139 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 28->139 141 Adds a directory exclusion to Windows Defender 28->141 40 6261a503129cc_Thu18ec9be488.exe 28->40         started        42 6261a50e713e0_Thu18571bb934a8.exe 28->42         started        44 6261a513c8a6f_Thu1810d438a2.exe 28->44         started        46 7 other processes 28->46 process12 dnsIp13 143 Multi AV Scanner detection for dropped file 31->143 145 Detected unpacking (changes PE section rights) 31->145 147 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 31->147 167 3 other signatures 31->167 48 explorer.exe 31->48 injected 85 C:\Users\...\6261a5118770b_Thu18f710a7c55.tmp, PE32 34->85 dropped 149 Antivirus detection for dropped file 34->149 151 Obfuscated command line found 34->151 153 Machine Learning detection for dropped file 34->153 53 6261a5118770b_Thu18f710a7c55.tmp 34->53         started        109 104.21.44.91 CLOUDFLARENETUS United States 37->109 155 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 37->155 157 Tries to harvest and steal browser information (history, passwords, etc) 37->157 159 Injects a PE file into a foreign processes 40->159 111 ip-api.com 208.95.112.1, 49764, 80 TUT-ASUS United States 42->111 113 192.168.2.1 unknown unknown 42->113 161 May check the online IP address of the machine 42->161 163 Tries to detect virtualization through RDTSC time measurements 42->163 115 iplogger.org 148.251.234.83, 443, 49766, 49780 HETZNER-ASDE Germany 44->115 117 www.icodeps.com 149.28.253.196, 443, 49761 AS-CHOOPAUS United States 44->117 119 212.192.246.217 RHC-HOSTINGGB Russian Federation 46->119 87 C:\Users\...\6261a507b219d_Thu1875c7ef049.tmp, PE32 46->87 dropped 165 Creates processes via WMI 46->165 55 6261a503c0a98_Thu18c0eb17f45.exe 46->55         started        57 6261a5107cb3e_Thu1827f871.exe 46->57         started        59 WerFault.exe 46->59         started        file14 signatures15 process16 dnsIp17 91 187.156.39.182 UninetSAdeCVMX Mexico 48->91 93 187.190.48.60 TOTALPLAYTELECOMUNICACIONESSADECVMX Mexico 48->93 101 8 other IPs or domains 48->101 69 C:\Users\user\AppData\Roaming\wriwjgr, PE32 48->69 dropped 71 C:\Users\user\AppData\Local\Temp\5740.exe, PE32 48->71 dropped 73 C:\Users\user\AppData\Local\Temp\7170.exe, PE32 48->73 dropped 121 System process connects to network (likely due to code injection or exploit) 48->121 123 Benign windows process drops PE files 48->123 125 Hides that the sample has been downloaded from the Internet (zone.identifier) 48->125 95 s3.pl-waw.scw.cloud 151.115.10.1, 443, 49768, 49771 OnlineSASFR United Kingdom 53->95 97 lindemann.s3.pl-waw.scw.cloud 53->97 75 C:\Users\user\AppData\Local\Temp\...\lBo5.exe, PE32 53->75 dropped 77 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 53->77 dropped 79 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 53->79 dropped 81 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 53->81 dropped 99 v.xyzgamev.com 172.67.188.70, 443, 49760, 49763 CLOUDFLARENETUS United States 55->99 83 C:\Users\user\AppData\Local\Temp\db.dll, PE32 55->83 dropped file18 signatures19
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-04-22 05:57:27 UTC
File Type:
PE (Exe)
Extracted files:
289
AV detection:
29 of 39 (74.36%)
Threat level:
  5/5
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars botnet:same1 botnet:supertest2012 aspackv2 backdoor discovery infostealer spyware stealer suricata trojan vmprotect
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Kills process with taskkill
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Process spawned unexpected child process
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Suspicious use of NtCreateUserProcessOtherParentProcess
suricata: ET MALWARE ClipBanker Variant Activity (POST)
Malware Config
C2 Extraction:
https://sa-us-bucket.s3.us-east-2.amazonaws.com/ysagdy415/
http://hanfinvest.at/upload/
http://phunilbeauty.com/upload/
http://spbdg.ru/upload/
http://tnt-az.com/upload/
http://casagenaro.com/upload/
http://girneotel.com/upload/
http://zennclinic.com/upload/
http://mordo.ru/forum/
http://piratia-life.ru/upload/
http://pkodev.net/upload/
91.213.50.241:25821
116.202.106.111:9582
Unpacked files
SH256 hash:
94b1a1928663783d55d18e068691d41fda717aec2b8c139cbeec537baf590cf1
MD5 hash:
dbe67324ed2ee469fb8cc030ffaa3448
SHA1 hash:
c99473f88d6e73360fe671ef0eb624b71b94315f
SH256 hash:
a7e37f5314834b163fa21557e61c13c0f202fd64d3c0e46e6c90d2d02e033aec
MD5 hash:
6faec01bf7a3d7f5c5dee2e6e3143a58
SHA1 hash:
603a36f817cab5574e58ab279379e5c112e5fb37
SH256 hash:
83d06ebfb6f477a0e6d225b1e56215fc6ba6ba0fabd744f44cc1b90ba451f7b3
MD5 hash:
f5581c05750ab130d1dfa492d60b0841
SHA1 hash:
d5537baf66cfb1c04a3ba2fc3fd8edb358c8e600
SH256 hash:
0945d87619dd1be75a81297e9395202b855edc6f8fd56d598d34b131eeb6cb86
MD5 hash:
4abd706adcfd6657e730a283fa2b9338
SHA1 hash:
d4be12bee970ca01c39b695a934b582a585fe70d
SH256 hash:
dbfb924dc54a3acc2103b23c1bcf4880b7c770835504d0ce811e61ab8b0f6a5e
MD5 hash:
1289880cba20fa461cc4b7aa1a79f435
SHA1 hash:
945c87dc8bf5687bacd649edb18d955e1daef225
SH256 hash:
11a085310469bb8eaf5a362cce12b0602fa658e967d6449549a9b1b86440560b
MD5 hash:
f9a8df21b929c4ffdaf8b95cf551a249
SHA1 hash:
752fc686d28f7c884512c852ff47e664f4967f97
SH256 hash:
73e1cdb258302b566d95281f94449ec6aae8bc8c1df1770228869b83541f2dc6
MD5 hash:
267697314a88064d30fad92ba8f5a090
SHA1 hash:
71c661bab07592276d96e6eccdf0a7c397e78962
SH256 hash:
1d2612e48f102469cf80780703906053fd83b43d2465a7149b57d488625967e8
MD5 hash:
76facad54fde2fc99754257bbb15c0d6
SHA1 hash:
530ba70e647d3e51726da2f12be8f4967a249f05
SH256 hash:
549681e7ea9efc88bc9a5861f0a1da1d61e261639e066307666ac2178f38b1d3
MD5 hash:
38ac30db2c49d24c1056f0fe75f1df6b
SHA1 hash:
2b36dcb6064bcb885f9017dbbef1d0e18a5f69f4
SH256 hash:
aa6ecfb157cb1e134d351d38d6b07d85ee34d8a56a26b0cc23515a37e1a4afd3
MD5 hash:
fd496a7667148dc1e73c23f77a68bebc
SHA1 hash:
01a055f68a7921dbbfe754d8687cb40b6149a499
SH256 hash:
51822e99ece18ac31a193079f264f10940417e7d65c8e16d55ceee7f743dc309
MD5 hash:
11d58bcdf92faf51179d2daaf99e11b3
SHA1 hash:
0c6ffc8f9db015ec1bd01e11420695faadf2c845
SH256 hash:
5a5c65d12f3f845c947a7f6e58c533f38cfec7ba52ecb28239e96ee788fa71f7
MD5 hash:
d93107e05fa93f02ff6959eb7eba85de
SHA1 hash:
fc42e1963f539977ef13332b8fedcc2286809d9d
SH256 hash:
8043a7d4d81a34b03e4cbb02f11df9698acc2a87ea1221f432adcf4c5384dfb3
MD5 hash:
53cc5d8d8671f757593ae5ed83688d31
SHA1 hash:
9bbaf0ca466501d5b08a20932312653f87dd2b29
SH256 hash:
70b785e5cb5b2e61c0f5da4a71ab0bbd14d9a0849387f037e0d75cc1ffe0a082
MD5 hash:
5951b52c9b4d11ca7f4f33e5a3fb2c31
SHA1 hash:
0bc54fd699fff7b93e5c447a141c0d904924ab0d
SH256 hash:
f9181827f9903d4f52020f6966853cbcb6e8fd981f9981fea1c6a7714dd5f7d6
MD5 hash:
bccd6e541b5b7bcf5321ee5d1142b566
SHA1 hash:
fab754df32477c8f3ee070738029b2e5459f500c
SH256 hash:
bc39ebe6efe6da87bf8c330785cd615e9c30417e766cc74eef492efcb9f1defd
MD5 hash:
5216d697b5b2e37c662ef0ea529c7355
SHA1 hash:
d8a520249a7fbbd29c95e64dcffb21c6b612bead
SH256 hash:
3b8ada8d8ccd116593d6a472c5b56f9ab7f31e94694eb8983a5bd1961728b2bb
MD5 hash:
42d62bd400488586f731c244914a79d1
SHA1 hash:
92a8500782668e8b2429ae4fc2fb6e0b79a2c986
SH256 hash:
5539304a83d81d193b3554e79d81da874571a7d0d0597f6f8bc2004b1962a22c
MD5 hash:
ee38bb4706c3d254605f66b213a825ec
SHA1 hash:
a917c474aa33f12bd2b5e5dba84f432456138f7a
SH256 hash:
c348c87eb656a1639b80534f48aa3ee4ee5f9e8f1b629d622010df9a9d50c00a
MD5 hash:
c89ad6771c5b68587f82859c725d0e56
SHA1 hash:
cd3bcf3d15b0d3bcffe702cdc0a74004df677d30
SH256 hash:
98dbbb9ad70785e3eb47d3a6feb9214c367ae9d6b81bcc7d1ee21afe5b65f430
MD5 hash:
010c77294268e40248fdf1df2b7d0347
SHA1 hash:
6e362e088b8b20b10ba235dc1fb620dcd0b7a475
SH256 hash:
17eba5a8fc60b5e62fbbea29e971691988da98a98db3a2c2bf9aad00b1b72dc4
MD5 hash:
e74d9b73743dfbb9f025a7908c85da37
SHA1 hash:
8a5b323b090cb0d2c4ff59f0ef520d323dd86097
SH256 hash:
5c0e2016045550abba229f63d9174bd1000f8a3ed04c98eca604627e0ce342af
MD5 hash:
b0bd8929ef8414ae4ec331354dd8346a
SHA1 hash:
585d3d2a5005cbcdeec9f3c37270299be35e286b
SH256 hash:
39a9b66c828fa38516f4487716f746459592a1a447265a407e08ee1a7fea6769
MD5 hash:
2e2d24e951d5a5bdb93f5dc33b83b38d
SHA1 hash:
b0b76fbd581afd1a56957edddf4ba0dcf91e062e
SH256 hash:
5741e219ef2d1cff821dc81bea80a6053f7da385563e5db43904ee1806625d50
MD5 hash:
d409f60f9d64824dae4ebb31458cb7cd
SHA1 hash:
6aca3154ed969d5d919a9451fbd6af4f0646cf66
SH256 hash:
f6c47786d9564e17bab11b85ded8ac4f5c8cc9b6f3c7130a8f8a5d33f3dd6d92
MD5 hash:
26e6c04c3c084cc2b6a340c194ecf7ac
SHA1 hash:
a557843b9e48cdb53efe362143df676531403782
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb2

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments