MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa2c27df76832b0f2df4613db54f00966faa279bc8c968b5b597f0e09f8f3fa8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 1 File information Comments

SHA256 hash: fa2c27df76832b0f2df4613db54f00966faa279bc8c968b5b597f0e09f8f3fa8
SHA3-384 hash: 78fd006e4c3c8f0baf71e137dfec650f20de7901c79b1c9a504ae2827db9de93843d466c6e77ff6dac32422fb194b0fd
SHA1 hash: 195d847307011bf23e9e2f1a2a74b6f6bfe25803
MD5 hash: 6e16281cbdd76989cd383fe4fd945023
humanhash: zulu-utah-orange-quebec
File name:6e16281cbdd76989cd383fe4fd945023.exe
Download: download sample
Signature RedLineStealer
File size:359'936 bytes
First seen:2022-04-15 01:01:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ce92d88910dad9eeb68593f866ac6902 (1 x RedLineStealer)
ssdeep 6144:Rz4hNvUSETJVDkGPO0xb++d8HUQMD9dPkaoCvOILA4VVha3t6zYaKHZ:uDULjYGPrxb++OdMD7PWaA
TLSH T12D74BF10BA90D035F5F762F486B683A8763E7DA0672454CB61E936EE5B346E0EC3035B
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 33f0696969696969 (117 x GCleaner, 10 x Nymaim, 1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.215.113.70:12189

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.70:12189 https://threatfox.abuse.ch/ioc/519949/

Intelligence


File Origin
# of uploads :
1
# of downloads :
326
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6e16281cbdd76989cd383fe4fd945023.exe
Verdict:
Malicious activity
Analysis date:
2022-04-15 01:02:44 UTC
Tags:
loader evasion

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending an HTTP GET request
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Launching a tool to kill processes
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed ransomware smokeloader tofsee
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
spre.troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Possible FUD Crypter (malicious underground PE packer) detected
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample or dropped binary is a compiled AutoHotkey binary
Sigma detected: Copying Sensitive Files with Credential Data
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Autohotkey Downloader Generic
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 609721 Sample: bbjSe7tIgt.exe Startdate: 15/04/2022 Architecture: WINDOWS Score: 100 73 iplogger.org 2->73 115 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->115 117 Multi AV Scanner detection for domain / URL 2->117 119 Malicious sample detected (through community Yara rule) 2->119 121 14 other signatures 2->121 10 bbjSe7tIgt.exe 36 2->10         started        signatures3 process4 dnsIp5 79 212.192.246.217, 49723, 80 RHC-HOSTINGGB Russian Federation 10->79 81 212.192.241.16, 49741, 80 RAPMSB-ASRU Russian Federation 10->81 83 2 other IPs or domains 10->83 55 C:\Users\user\AppData\...55cBOMdivq.exe, PE32 10->55 dropped 57 C:\Users\user\AppData\...\4xOk1IiRv.exe, PE32 10->57 dropped 59 C:\Users\user\AppData\Roaming\...\BePvr.exe, PE32 10->59 dropped 61 7 other files (4 malicious) 10->61 dropped 14 4xOk1IiRv.exe 10->14         started        19 NcBOMdivq.exe 10->19         started        21 BePvr.exe 10->21         started        23 7 other processes 10->23 file6 process7 dnsIp8 85 iplogger.org 148.251.234.83, 443, 49739, 49772 HETZNER-ASDE Germany 14->85 87 dwefrgtrfedw.top 91.206.93.47, 49743, 80 ASBAXETNRU Russian Federation 14->87 63 C:\Users\user\AppData\...\strongix.exe, PE32 14->63 dropped 91 Detected unpacking (changes PE section rights) 14->91 93 Detected unpacking (overwrites its own PE header) 14->93 95 May check the online IP address of the machine 14->95 97 Sample or dropped binary is a compiled AutoHotkey binary 14->97 25 strongix.exe 14->25         started        99 Detected unpacking (creates a PE file in dynamic memory) 19->99 101 Possible FUD Crypter (malicious underground PE packer) detected 19->101 103 Found evasive API chain (may stop execution after checking mutex) 19->103 111 6 other signatures 19->111 29 NcBOMdivq.exe 19->29         started        89 poqxjd42.top 188.225.34.236, 49780, 80 TIMEWEB-ASRU Russian Federation 21->89 105 Multi AV Scanner detection for dropped file 21->105 107 Query firmware table information (likely to detect VMs) 21->107 109 Tries to detect sandboxes and other dynamic analysis tools (window names) 21->109 113 3 other signatures 21->113 31 cmd.exe 21->31         started        33 cmd.exe 21->33         started        35 cmd.exe 21->35         started        37 2 other processes 21->37 65 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 23->65 dropped 67 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 23->67 dropped 69 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 23->69 dropped 71 4 other malicious files 23->71 dropped file9 signatures10 process11 dnsIp12 75 185.215.113.70, 12189, 49799 WHOLESALECONNECTIONSNL Portugal 25->75 123 Detected unpacking (changes PE section rights) 25->123 125 Detected unpacking (overwrites its own PE header) 25->125 127 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->127 129 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 25->129 77 cheapf.link 2.57.187.229, 49730, 49731, 49732 DTLNRU Russian Federation 29->77 131 Tries to harvest and steal browser information (history, passwords, etc) 29->131 133 Tries to steal Crypto Currency Wallets 29->133 39 cmd.exe 29->39         started        41 conhost.exe 31->41         started        43 conhost.exe 33->43         started        45 conhost.exe 35->45         started        47 conhost.exe 37->47         started        49 conhost.exe 37->49         started        signatures13 process14 process15 51 conhost.exe 39->51         started        53 timeout.exe 39->53         started       
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-04-12 04:33:59 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
33 of 42 (78.57%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Checks computer location settings
Deletes itself
Unpacked files
SH256 hash:
d1c637b919a6fe3b6abef8346ca1236fc816e9aada7bd0d08733e1f38f276b9b
MD5 hash:
23c9db340fcf3988933626864ba9cca8
SHA1 hash:
be9475c125a1523853567fea4da6fd20bbbc896e
SH256 hash:
fa2c27df76832b0f2df4613db54f00966faa279bc8c968b5b597f0e09f8f3fa8
MD5 hash:
6e16281cbdd76989cd383fe4fd945023
SHA1 hash:
195d847307011bf23e9e2f1a2a74b6f6bfe25803
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments