MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc45728dcdf75985369c218c0386d8b5e3e49fcbce67bf41c02ba31c01300b0a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 2 YARA File information Comments

SHA256 hash: fc45728dcdf75985369c218c0386d8b5e3e49fcbce67bf41c02ba31c01300b0a
SHA3-384 hash: 2ac42e2a70970cec9babd32db1acd9679fde73f6af3f0ac407de19407fe687cfb7e591c9e69209de2aef6be41e00fec7
SHA1 hash: 89f4751d04bd6c30eb41e9d9e5631e758aba6b6b
MD5 hash: d2ee9fe7a5e32b70bb22438049025aa6
humanhash: nuts-violet-alpha-indigo
File name:FC45728DCDF75985369C218C0386D8B5E3E49FCBCE67B.exe
Download: download sample
Signature RedLineStealer
File size:5'757'339 bytes
First seen:2022-08-08 06:05:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox)
ssdeep 98304:JOwO5QdckVNungkwwuSTEESxLy5NYTf7bWNqi3ZT+Gpx12LjXIEqlkpDGu:J0C9ukSTPS9YNgziIipyMx12LkEqlxu
TLSH T18B4633BABC75FCF1EB5C56B20845467BA06DE9C8F77126703AD03504D3B91C8A53B0A9
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://89.185.85.53/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://89.185.85.53/ https://threatfox.abuse.ch/ioc/841794/
5.154.181.106:80 https://threatfox.abuse.ch/ioc/841985/

Intelligence


File Origin
# of uploads :
1
# of downloads :
284
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FC45728DCDF75985369C218C0386D8B5E3E49FCBCE67B.exe
Verdict:
No threats detected
Analysis date:
2022-08-08 06:07:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
60%
Tags:
arkeistealer barys nymeria overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Nymaim, RedLine, Socelars, onlyLogger
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Generic Downloader
Yara detected Nymaim
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Yara Genericmalware
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 680202 Sample: FC45728DCDF75985369C218C038... Startdate: 08/08/2022 Architecture: WINDOWS Score: 100 100 xzaaen.click 2->100 102 whealclothing.xyz 2->102 104 13 other IPs or domains 2->104 150 Snort IDS alert for network traffic 2->150 152 Multi AV Scanner detection for domain / URL 2->152 154 Malicious sample detected (through community Yara rule) 2->154 156 27 other signatures 2->156 12 FC45728DCDF75985369C218C0386D8B5E3E49FCBCE67B.exe 10 2->12         started        signatures3 process4 file5 90 C:\Users\user\AppData\...\setup_installer.exe, PE32 12->90 dropped 15 setup_installer.exe 24 12->15         started        process6 file7 92 C:\Users\user\AppData\...\setup_install.exe, PE32 15->92 dropped 94 C:\Users\user\AppData\...\Tue17f1e3fedead.exe, PE32 15->94 dropped 96 C:\Users\user\...\Tue17f183b40bf8f0ac9.exe, PE32 15->96 dropped 98 19 other files (14 malicious) 15->98 dropped 18 setup_install.exe 15->18         started        process8 dnsIp9 106 127.0.0.1 unknown unknown 18->106 108 mooorni.xyz 18->108 158 Performs DNS queries to domains with low reputation 18->158 160 Adds a directory exclusion to Windows Defender 18->160 162 Disables Windows Defender (via service or powershell) 18->162 22 cmd.exe 1 18->22         started        24 cmd.exe 18->24         started        26 cmd.exe 18->26         started        28 17 other processes 18->28 signatures10 process11 signatures12 31 Tue175473c2c8157a.exe 4 31 22->31         started        36 Tue1776d0c3c20.exe 24->36         started        38 Tue176fb5acbe4e.exe 26->38         started        164 Adds a directory exclusion to Windows Defender 28->164 166 Disables Windows Defender (via service or powershell) 28->166 40 Tue17aa01b7ad9.exe 28->40         started        42 Tue17ed14d9ee5c3ff8.exe 28->42         started        44 Tue1780fd628d8744.exe 28->44         started        46 12 other processes 28->46 process13 dnsIp14 116 ipinfo.io 31->116 118 8 other IPs or domains 31->118 62 C:\Users\user\AppData\Local\...\6523[1].exe, PE32 31->62 dropped 64 C:\Users\user\AppData\...\Service[1].exe, PE32 31->64 dropped 66 C:\Users\user\Pictures\...\wam_3.bmp.exe, PE32+ 31->66 dropped 76 2 other files (none is malicious) 31->76 dropped 130 Antivirus detection for dropped file 31->130 132 May check the online IP address of the machine 31->132 134 Disable Windows Defender real time protection (registry) 31->134 136 Machine Learning detection for dropped file 36->136 138 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 36->138 140 Checks if the current machine is a virtual machine (disk enumeration) 36->140 48 explorer.exe 36->48 injected 120 9 other IPs or domains 38->120 68 C:\Users\user\AppData\...\Service[1].exe, PE32 38->68 dropped 70 C:\Users\user\AppData\Local\...\6523[1].exe, PE32 38->70 dropped 72 C:\Users\user\Pictures\...\newfile.exe.exe, PE32 38->72 dropped 78 4 other files (none is malicious) 38->78 dropped 50 NiceProcessX64.bmp.exe 38->50         started        122 2 other IPs or domains 40->122 142 Found evasive API chain (trying to detect sleep duration tampering with parallel thread) 40->142 124 3 other IPs or domains 42->124 144 Tries to harvest and steal browser information (history, passwords, etc) 42->144 126 2 other IPs or domains 44->126 128 4 other IPs or domains 46->128 74 C:\Users\user\...\Tue1764717dab33f7d.tmp, PE32 46->74 dropped 146 Obfuscated command line found 46->146 53 Tue17775f71f24d3bd22.exe 46->53         started        56 Tue1764717dab33f7d.tmp 46->56         started        58 mshta.exe 46->58         started        file15 148 Connects to a pastebin service (likely for C&C) 116->148 signatures16 process17 dnsIp18 80 C:\Users\...\pidHTSIGEi8DrAmaYu9K8ghN89.dll, PE32+ 50->80 dropped 110 freegeoip.app 188.114.96.3, 443, 49774 CLOUDFLARENETUS European Union 53->110 112 188.114.97.3, 443, 49892 CLOUDFLARENETUS European Union 53->112 114 t.gogamec.com 53->114 82 C:\Users\user\AppData\Local\Temp\sqlite.dll, PE32 53->82 dropped 60 conhost.exe 53->60         started        84 C:\Users\user\AppData\Local\Temp\...\idp.dll, PE32 56->84 dropped 86 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 56->86 dropped 88 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 56->88 dropped file19 process20
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2021-10-27 06:35:28 UTC
File Type:
PE (Exe)
Extracted files:
218
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
socelars
Score:
  10/10
Tags:
family:onlylogger family:privateloader family:raccoon family:redline family:socelars botnet:839b5f035af17fe32dbee0ca113be5fc botnet:chris botnet:media25 botnet:pub2 aspackv2 evasion infostealer loader main spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates processes with tasklist
Kills process with taskkill
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Enumerates physical storage devices
Program crash
AutoIT Executable
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
OnlyLogger payload
Modifies Windows Defender Real-time Protection settings
OnlyLogger
PrivateLoader
Process spawned unexpected child process
Raccoon
Raccoon Stealer payload
RedLine
RedLine payload
Socelars
Socelars payload
Malware Config
C2 Extraction:
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
91.121.67.60:23325
194.104.136.5:46013
185.215.113.46:80
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
http://89.185.85.53/
Unpacked files
SH256 hash:
ffb0fcede542fa2a31553073105b74f85e3a6d92987392dcce5e5e49743c878b
MD5 hash:
688bb186be4be7a4e668f4dff71ce220
SHA1 hash:
bc06b533f88e5260bdb9f63d19bac9fe71ee5c64
SH256 hash:
4887918b59cd66475a12a9c512ec570e6f900c23ef69ff7513e2b5cd63fd2ef2
MD5 hash:
4d3446a7e14d3250e1030b67e202c8dd
SHA1 hash:
cd8fdfdfed34fcd05700293658bfcf8528e68802
Detections:
win_smokeloader_a2
SH256 hash:
534941aa9745122d54bf41c53ad86c2e01a404d8075953c7b573cd20c1769244
MD5 hash:
de23f9266342b674f688c226caa704ce
SHA1 hash:
4fe39174632906914568b2b774e11d6ea456d393
SH256 hash:
92bc70b3e7e6c99bc93dec85ecd8db8b101a766917bee4967d36b20f5522ff57
MD5 hash:
b78915e5316a375923d57cd80d805845
SHA1 hash:
5ad907aa1adc5f7899a9304b4e814b381e4909de
SH256 hash:
41e3a2fc623255bf0242d98b5ec250e936bffbd2f5088699a450ef3079cb8107
MD5 hash:
2ed7bbac4969a0fe0466893cc12c7f51
SHA1 hash:
db8d430d28ab9a207fb9413b2a4ebb5ca182d4b2
SH256 hash:
eb8ffea34c1766bf42f4118fee7407047f71815ef92dec221121baf95338460d
MD5 hash:
138a0694a61a8f01bec3075df64aba30
SHA1 hash:
db4e3180dc492536e7d6a42f086c9b2b4c133e13
SH256 hash:
3c52bd10354f43581bf9a9a9a412110fd6675cfc3f0b95723e626119d801e81b
MD5 hash:
e6572d2bb4bd2e0910a9e35ef782f594
SHA1 hash:
da44b50ff1b7e2a7275d57dbae6b11cef418920f
SH256 hash:
2c964c5070502f6000bbb3f66f200a18ac7c394c5d6764c1d1f726783959d40a
MD5 hash:
5b68c333ae0c1d013619eda08f6665db
SHA1 hash:
d616077f94916d44662b6c6bf19b177e32454559
SH256 hash:
82b60a8c25db65bae520e73b7a67d2a6ca1f0fe6926439d0d7f1c0d52aa2f7d4
MD5 hash:
a758705ffd480485776c573bbe7091ca
SHA1 hash:
ae62bd009da6c2bf8e91f06a9a01890f74828d07
SH256 hash:
18383da9014c5143e91289c25e54bf8c286b480a0db25bd6e258386fa3704ee2
MD5 hash:
dc7af3760f24a022498c5872d40de945
SHA1 hash:
930899be0bea51091cb0a4d3b3d9e3a1d875b932
SH256 hash:
1599439bc3bad830c9eaa1045675a2064a41cf07a99465a0f1d149401371b8f1
MD5 hash:
b63f40f06cd7df80522acf4271ce78ea
SHA1 hash:
800a140ba9df9cdad361fe234ae7d96d4b389014
SH256 hash:
451fa609dbcdacee3f6b46a82a187636928ca42a38d1efa20f86f55ea3266f56
MD5 hash:
dd42414bab9b1f74e4c29ba2855ec4f8
SHA1 hash:
7daceb27584836d008f6a4617d82bb4539e3be85
Detections:
win_privateloader_a0 win_privateloader_w0
SH256 hash:
eb2beb14afe375a6b1fadafea434d8648a63e68a27b6b5923ecfdac40318e1cb
MD5 hash:
c8dc59b999863c9f4caf49718283fdfc
SHA1 hash:
6f3c65ba58243d8630ea107037ee043b29465a7c
SH256 hash:
4e35f60a5fd61e42653f13b8b1687aaac54de5a55ce26b89be3f4c7da2d6e3a5
MD5 hash:
f9697832b91a4f0f7ee007b463192f85
SHA1 hash:
5229d0696976279c0d8a46dee50c5602d34dbbb3
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e297e89e11933aa6fc67cbd8da44fc0f6b8d8030166738b111b31673d41e4d19
MD5 hash:
2a2667d1fbcd8fde9ca0bd6f50827c79
SHA1 hash:
f6838f02651e1430613bf78de99e240dbcb8d3c7
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
142353c431e29ccce23e6a7e5a23ecbfc044e879331d33b51bc3413307a6f8f1
MD5 hash:
111a2f724d917c7d1707ad76bd927ea0
SHA1 hash:
3924cee72f2bdd170a286e6ba4bd4ae913137828
SH256 hash:
a55886b696bd3a865bb89d695accd3107b865460ce4f5d340d16e1c028bdc18d
MD5 hash:
d7e16ec1f086afd1368794129b50dc48
SHA1 hash:
73851a51f7a09186b644b76514728d1f6103c188
SH256 hash:
b3bbfa6bcba46e6215625935ff5ab834a8b57ac04483c223fc46ef469d191eb6
MD5 hash:
727dd55fb548b5031bffb3fbc79e593c
SHA1 hash:
14eb78ea9863076db08ed15223cbd6a02afbd357
SH256 hash:
b7a9ba1d58d3f258f942dbad1bfa4d6b34ec25a70b0d8181afd8f78961ca4757
MD5 hash:
853fb9dd8b491f238dfcdcb4e66190df
SHA1 hash:
1f6c0e3efe2dd24f5600140c58be5abc2bfb858d
SH256 hash:
116b58c9d589b59c56384ec9db883e00828779a6cbbf9b97772584ba1a37d3f9
MD5 hash:
2ba62cac6b2bde21552301dd23ecffee
SHA1 hash:
874d139b020c473a0a1530495575738409112207
SH256 hash:
7cda937e6eb0b1c1630c94328ab02170291b4e71d6dd7f6701eb3ffeb398ef0d
MD5 hash:
7167c1c6456bf24dfa3284cfc45a4c26
SHA1 hash:
eb24605ac5cedc497b73810dd97dd2a1290a6b1d
SH256 hash:
fc45728dcdf75985369c218c0386d8b5e3e49fcbce67bf41c02ba31c01300b0a
MD5 hash:
d2ee9fe7a5e32b70bb22438049025aa6
SHA1 hash:
89f4751d04bd6c30eb41e9d9e5631e758aba6b6b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments