MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fdc91eae152f8f8c6230c368d8f2f1ebd38097cfe049d9ec115c0cf0b75855bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: fdc91eae152f8f8c6230c368d8f2f1ebd38097cfe049d9ec115c0cf0b75855bc
SHA3-384 hash: d74126fb7b6f73e686339334ce058098e4c41b32c372a773a52da2f909a6094c95cce50b142d34cc1d03b357275c752e
SHA1 hash: 2d93ad90ec8e2ac21a3f27eae5b3a231dace2381
MD5 hash: d20ff3062ca2670136387a8870da3556
humanhash: rugby-sixteen-nebraska-quiet
File name:d20ff3062ca2670136387a8870da3556.exe
Download: download sample
Signature RedLineStealer
File size:1'613'312 bytes
First seen:2023-10-30 07:16:11 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:sqhiTI4pfbGEj/j9/SM62HKq1tVDaK2t0BV:tIUEjJaL2HZ0uB
Threatray 2'447 similar samples on MalwareBazaar
TLSH T15175330252D85133C87B4BB629F60AEB1F3EBC918DE9572F33406C9505B26C9A97371B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
194.49.94.11:80

Intelligence


File Origin
# of uploads :
1
# of downloads :
298
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching a service
Сreating synchronization primitives
Creating a file
Creating a window
Launching cmd.exe command interpreter
Searching for synchronization primitives
Running batch commands
Behavior that indicates a threat
Blocking the Windows Defender launch
Disabling the operating system update service
Forced shutdown of a system process
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, Raccoo
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
DNS related to crypt mining pools
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1334083 Sample: 6cbfQ0H7lo.exe Startdate: 30/10/2023 Architecture: WINDOWS Score: 100 192 youtube-ui.l.google.com 2->192 194 xmr-eu1.nanopool.org 2->194 196 20 other IPs or domains 2->196 250 Snort IDS alert for network traffic 2->250 252 Found malware configuration 2->252 254 Malicious sample detected (through community Yara rule) 2->254 256 23 other signatures 2->256 15 6cbfQ0H7lo.exe 1 4 2->15         started        18 svchost.exe 2->18         started        21 explothe.exe 2->21         started        signatures3 process4 dnsIp5 182 C:\Users\user\AppData\Local\...\qf3jx91.exe, PE32 15->182 dropped 184 C:\Users\user\AppData\Local\...\7ow0QW67.exe, PE32 15->184 dropped 23 qf3jx91.exe 1 4 15->23         started        27 7ow0QW67.exe 15->27         started        198 127.0.0.1 unknown unknown 18->198 file6 process7 file8 152 C:\Users\user\AppData\Local\...\vO1bs88.exe, PE32 23->152 dropped 154 C:\Users\user\AppData\Local\...\6xV8lH4.exe, PE32 23->154 dropped 270 Antivirus detection for dropped file 23->270 272 Multi AV Scanner detection for dropped file 23->272 274 Machine Learning detection for dropped file 23->274 29 vO1bs88.exe 1 4 23->29         started        33 6xV8lH4.exe 23->33         started        35 cmd.exe 27->35         started        37 conhost.exe 27->37         started        signatures9 process10 file11 174 C:\Users\user\AppData\Local\...\gg7Vw89.exe, PE32 29->174 dropped 176 C:\Users\user\AppData\Local\...\5ke5ys0.exe, PE32 29->176 dropped 310 Antivirus detection for dropped file 29->310 312 Multi AV Scanner detection for dropped file 29->312 314 Machine Learning detection for dropped file 29->314 39 gg7Vw89.exe 1 4 29->39         started        43 5ke5ys0.exe 29->43         started        45 chrome.exe 35->45         started        48 chrome.exe 35->48         started        50 chrome.exe 35->50         started        52 7 other processes 35->52 signatures12 process13 dnsIp14 156 C:\Users\user\AppData\Local\...\Bb1ZH28.exe, PE32 39->156 dropped 158 C:\Users\user\AppData\Local\...\4Li986to.exe, PE32 39->158 dropped 276 Antivirus detection for dropped file 39->276 278 Multi AV Scanner detection for dropped file 39->278 280 Machine Learning detection for dropped file 39->280 54 Bb1ZH28.exe 1 4 39->54         started        58 4Li986to.exe 39->58         started        160 C:\Users\user\AppData\Local\...\explothe.exe, PE32 43->160 dropped 60 explothe.exe 43->60         started        224 239.255.255.250 unknown Reserved 45->224 63 chrome.exe 45->63         started        65 chrome.exe 48->65         started        67 chrome.exe 50->67         started        69 chrome.exe 52->69         started        71 chrome.exe 52->71         started        73 5 other processes 52->73 file15 signatures16 process17 dnsIp18 144 C:\Users\user\AppData\Local\...\MU6wH37.exe, PE32 54->144 dropped 146 C:\Users\user\AppData\Local\...\3yG43my.exe, PE32 54->146 dropped 258 Multi AV Scanner detection for dropped file 54->258 75 3yG43my.exe 54->75         started        78 MU6wH37.exe 1 4 54->78         started        260 Writes to foreign memory regions 58->260 262 Allocates memory in foreign processes 58->262 264 Injects a PE file into a foreign processes 58->264 81 AppLaunch.exe 58->81         started        216 77.91.124.1 ECOTEL-ASRU Russian Federation 60->216 148 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 60->148 dropped 150 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 60->150 dropped 266 Creates an undocumented autostart registry key 60->266 268 Uses schtasks.exe or at.exe to add and modify task schedules 60->268 84 cmd.exe 60->84         started        86 schtasks.exe 60->86         started        88 rundll32.exe 60->88         started        218 static.ads-twitter.com 63->218 220 twitter.com 104.244.42.1 TWITTERUS United States 63->220 222 39 other IPs or domains 63->222 file19 signatures20 process21 dnsIp22 286 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 75->286 288 Maps a DLL or memory area into another process 75->288 290 Checks if the current machine is a virtual machine (disk enumeration) 75->290 292 Creates a thread in another existing process (thread injection) 75->292 90 explorer.exe 59 31 75->90 injected 178 C:\Users\user\AppData\Local\...\2gX6810.exe, PE32 78->178 dropped 180 C:\Users\user\AppData\Local\...\1AC96wO7.exe, PE32 78->180 dropped 95 1AC96wO7.exe 78->95         started        97 2gX6810.exe 78->97         started        190 77.91.124.86 ECOTEL-ASRU Russian Federation 81->190 294 Found many strings related to Crypto-Wallets (likely being stolen) 81->294 99 chrome.exe 81->99         started        101 chrome.exe 81->101         started        103 conhost.exe 84->103         started        105 cmd.exe 84->105         started        109 5 other processes 84->109 107 conhost.exe 86->107         started        file23 signatures24 process25 dnsIp26 208 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 90->208 210 77.91.68.249 FOTONTELECOM-TRANSIT-ASFOTONTELECOMISPRU Russian Federation 90->210 214 4 other IPs or domains 90->214 166 C:\Users\user\AppData\Local\Temp\F6E9.exe, PE32 90->166 dropped 168 C:\Users\user\AppData\Local\Temp\F3CB.exe, PE32 90->168 dropped 170 C:\Users\user\AppData\Local\Temp766.exe, PE32+ 90->170 dropped 172 9 other malicious files 90->172 dropped 296 System process connects to network (likely due to code injection or exploit) 90->296 298 Benign windows process drops PE files 90->298 111 9082.exe 90->111         started        115 98B3.exe 90->115         started        117 92C5.exe 90->117         started        126 2 other processes 90->126 300 Contains functionality to inject code into remote processes 95->300 302 Writes to foreign memory regions 95->302 304 Allocates memory in foreign processes 95->304 119 AppLaunch.exe 9 1 95->119         started        306 Injects a PE file into a foreign processes 97->306 121 AppLaunch.exe 12 97->121         started        212 192.168.2.5 unknown unknown 99->212 308 Found many strings related to Crypto-Wallets (likely being stolen) 99->308 124 chrome.exe 99->124         started        file27 signatures28 process29 dnsIp30 186 C:\Users\user\AppData\Local\...S9pn5mS.exe, PE32 111->186 dropped 188 C:\Users\user\AppData\Local\...\6jw45jY.exe, PE32 111->188 dropped 226 Antivirus detection for dropped file 111->226 228 Multi AV Scanner detection for dropped file 111->228 230 Machine Learning detection for dropped file 111->230 128 ES9pn5mS.exe 111->128         started        232 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 115->232 234 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 115->234 236 Tries to harvest and steal browser information (history, passwords, etc) 115->236 238 Modifies windows update settings 119->238 240 Disable Windows Defender notifications (registry) 119->240 242 Disable Windows Defender real time protection (registry) 119->242 200 193.233.255.73 FREE-NET-ASFREEnetEU Russian Federation 121->200 202 142.251.16.106 GOOGLEUS United States 124->202 204 172.253.122.102 GOOGLEUS United States 124->204 206 5 other IPs or domains 124->206 132 conhost.exe 126->132         started        134 chrome.exe 126->134         started        file31 signatures32 process33 file34 140 C:\Users\user\AppData\Local\...\Ob6wR7QI.exe, PE32 128->140 dropped 142 C:\Users\user\AppData\Local\...\5ux43Is.exe, PE32 128->142 dropped 244 Antivirus detection for dropped file 128->244 246 Multi AV Scanner detection for dropped file 128->246 248 Machine Learning detection for dropped file 128->248 136 Ob6wR7QI.exe 128->136         started        signatures35 process36 file37 162 C:\Users\user\AppData\Local\...\Cy7ZW6fp.exe, PE32 136->162 dropped 164 C:\Users\user\AppData\Local\...\4Tb100dP.exe, PE32 136->164 dropped 282 Antivirus detection for dropped file 136->282 284 Machine Learning detection for dropped file 136->284 signatures38
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2023-10-30 05:37:09 UTC
File Type:
PE (Exe)
Extracted files:
226
AV detection:
20 of 23 (86.96%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:redline family:smokeloader family:zgrat botnet:grome botnet:kinza botnet:up3 backdoor evasion infostealer persistence rat trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Checks computer location settings
Executes dropped EXE
Downloads MZ/PE file
Amadey
Detect ZGRat V1
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SmokeLoader
ZGRat
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
aa9edb846da9741409fd54e95def5f70553c00b1dddefd5e95dbf3310c814027
MD5 hash:
bf6cef0ed9eb079128f00fa65d33dd00
SHA1 hash:
3030aae2bb61e77c6dbdc6f0ee4916ad3acbc02a
Detections:
SmokeLoaderStage2 win_smokeloader_a2
SH256 hash:
f5992a864c353d48df3c6f3fdaa357b7c5d6c8f38c72750a9aae5da5e12fdd03
MD5 hash:
58349704c9f6bf7b548fbeb8acbd3e51
SHA1 hash:
6cc9b9653aa9e6f20356e352e3b0ba0b09ef44e4
SH256 hash:
e38a33e98d814c3318d51443e2f59236edfbc8417fd777e5062e99d36efcbc7a
MD5 hash:
0bf057332a0803f71e565a335d04edf0
SHA1 hash:
798406d11790a9c876fd47d30caa834746832d04
SH256 hash:
d198edf9e0d6239a898e3948bf14cf6eeb5ce4fece2bb72a422a909fdba12cce
MD5 hash:
1bcd6534d6c50d9abf09bc5793774747
SHA1 hash:
d80a222e504604270747787acb84ba18c81ef449
SH256 hash:
fdc91eae152f8f8c6230c368d8f2f1ebd38097cfe049d9ec115c0cf0b75855bc
MD5 hash:
d20ff3062ca2670136387a8870da3556
SHA1 hash:
2d93ad90ec8e2ac21a3f27eae5b3a231dace2381
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe fdc91eae152f8f8c6230c368d8f2f1ebd38097cfe049d9ec115c0cf0b75855bc

(this sample)

  
Delivery method
Distributed via web download

Comments