MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fe8417ad3e0bad396fd009f20ad6cb106605098ec72fb933bb6f8e16cb6d437d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 22 File information Comments

SHA256 hash: fe8417ad3e0bad396fd009f20ad6cb106605098ec72fb933bb6f8e16cb6d437d
SHA3-384 hash: e48f8d7ea7a871870bfe4a3b51a963e5dcdf1386059f27c28ed1093207b7cebfeed18e98d0d0b25090829f0a733df81a
SHA1 hash: 166359124345a00d6f14c0057ff9801f3cd76e7a
MD5 hash: c67fddcbcfda1b6799b8a763c13b531a
humanhash: idaho-fifteen-massachusetts-steak
File name:C67FDDCBCFDA1B6799B8A763C13B531A.exe
Download: download sample
Signature RedLineStealer
File size:3'901'741 bytes
First seen:2021-07-05 06:05:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 49152:UbA30umWsO3LaotiFKbN3kqSyzkMi8UFKHf4vyqsvtFtD65nuVHtCowdkeFxtivq:UbiH1zKG3izE4vyqsVJNCoP0GvkyZ9bS
Threatray 148 similar samples on MalwareBazaar
TLSH 8C0633807D91D4B1D1661A755A396B26843EFC249B2CCBFF63A85C2ED471180B732BB3
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.215.113.85:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.85:80 https://threatfox.abuse.ch/ioc/157534/

Intelligence


File Origin
# of uploads :
1
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
C67FDDCBCFDA1B6799B8A763C13B531A.exe
Verdict:
Malicious activity
Analysis date:
2021-07-05 06:08:56 UTC
Tags:
evasion autoit trojan stealer vidar loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey Backstage Stealer Raccoon RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
DLL reload attack detected
Drops PE files to the document folder of the user
Drops PE files to the user root directory
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Renames NTDLL to bypass HIPS
Sample is protected by VMProtect
Sample uses process hollowing technique
Sets debug register (to hijack the execution of another thread)
Sigma detected: Execution from Suspicious Folder
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Backstage Stealer
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Socelars
Yara detected Vidar
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 444110 Sample: iew852qEQI.exe Startdate: 05/07/2021 Architecture: WINDOWS Score: 100 89 email.yg9.me 198.13.62.186 AS-CHOOPAUS United States 2->89 91 185.215.113.85 WHOLESALECONNECTIONSNL Portugal 2->91 93 4 other IPs or domains 2->93 143 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->143 145 Multi AV Scanner detection for domain / URL 2->145 147 Found malware configuration 2->147 149 22 other signatures 2->149 9 iew852qEQI.exe 1 14 2->9         started        12 iexplore.exe 2 66 2->12         started        signatures3 process4 file5 55 C:\Users\user\Desktop\pub2.exe, PE32 9->55 dropped 57 C:\Users\user\Desktop\jg3_3uag.exe, PE32 9->57 dropped 59 C:\Users\user\Desktop\Installation.exe, PE32 9->59 dropped 61 5 other files (none is malicious) 9->61 dropped 14 Files.exe 10 9->14         started        17 pub2.exe 9->17         started        20 Folder.exe 9->20         started        25 5 other processes 9->25 22 iexplore.exe 38 12->22         started        process6 dnsIp7 67 C:\Users\user\AppData\Local\Temp\...\File.exe, PE32 14->67 dropped 27 File.exe 3 20 14->27         started        69 C:\Users\user\AppData\Local\Temp\CC4F.tmp, PE32 17->69 dropped 131 DLL reload attack detected 17->131 133 Detected unpacking (changes PE section rights) 17->133 135 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 17->135 141 4 other signatures 17->141 32 explorer.exe 17->32 injected 71 C:\Users\user\AppData\Local\Temp\axhub.dll, PE32 20->71 dropped 34 rundll32.exe 20->34         started        36 conhost.exe 20->36         started        95 iplogger.org 88.99.66.31, 443, 49722, 49723 HETZNER-ASDE Germany 22->95 97 159.65.63.164 DIGITALOCEAN-ASNUS United States 25->97 99 www.listincode.com 144.202.76.47, 443, 49724 AS-CHOOPAUS United States 25->99 101 6 other IPs or domains 25->101 73 C:\Users\user\Documents\...\jg3_3uag.exe, PE32 25->73 dropped 75 C:\Users\user\AppData\...\jfiag3g_gg.exe, PE32 25->75 dropped 77 C:\Users\user\AppData\Local\Temp\haleng.exe, PE32 25->77 dropped 79 4 other files (none is malicious) 25->79 dropped 137 Drops PE files to the document folder of the user 25->137 139 Tries to harvest and steal browser information (history, passwords, etc) 25->139 38 jfiag3g_gg.exe 25->38         started        40 WerFault.exe 25->40         started        42 WerFault.exe 25->42         started        44 jfiag3g_gg.exe 25->44         started        file8 signatures9 process10 dnsIp11 103 newja.webtm.ru 92.53.96.150, 49720, 80 TIMEWEB-ASRU Russian Federation 27->103 105 192.168.2.1 unknown unknown 27->105 63 C:\Users\Public\run2.exe, PE32 27->63 dropped 65 C:\Users\Public\run.exe, PE32 27->65 dropped 151 Drops PE files to the user root directory 27->151 46 run2.exe 27->46         started        51 run.exe 27->51         started        153 Hides that the sample has been downloaded from the Internet (zone.identifier) 32->153 155 Writes to foreign memory regions 34->155 157 Allocates memory in foreign processes 34->157 159 Creates a thread in another existing process (thread injection) 34->159 53 svchost.exe 34->53 injected 161 Antivirus detection for dropped file 38->161 163 Tries to harvest and steal browser information (history, passwords, etc) 38->163 file12 signatures13 process14 dnsIp15 107 157.90.127.76, 49735, 80 REDIRISRedIRISAutonomousSystemES United States 46->107 109 sergeevih43.tumblr.com 74.114.154.18, 443, 49732 AUTOMATTICUS Canada 46->109 81 C:\Users\user\AppData\...\vcruntime140[1].dll, PE32 46->81 dropped 83 C:\Users\user\AppData\...\msvcp140[1].dll, PE32 46->83 dropped 85 C:\Users\user\AppData\Local\...\nss3[1].dll, PE32 46->85 dropped 87 9 other files (none is malicious) 46->87 dropped 111 Multi AV Scanner detection for dropped file 46->111 113 Detected unpacking (changes PE section rights) 46->113 115 Detected unpacking (overwrites its own PE header) 46->115 129 3 other signatures 46->129 117 Machine Learning detection for dropped file 51->117 119 Sample uses process hollowing technique 51->119 121 Injects a PE file into a foreign processes 51->121 123 System process connects to network (likely due to code injection or exploit) 53->123 125 Sets debug register (to hijack the execution of another thread) 53->125 127 Modifies the context of a thread in another process (thread injection) 53->127 file16 signatures17
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-07-02 04:43:12 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:smokeloader family:socelars family:vidar backdoor evasion infostealer stealer trojan upx vmprotect
Behaviour
Kills process with taskkill
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
autoit_exe
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Executes dropped EXE
UPX packed file
VMProtect packed file
Vidar Stealer
RedLine
RedLine Payload
SmokeLoader
Socelars
Socelars Payload
Vidar
Malware Config
C2 Extraction:
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Unpacked files
SH256 hash:
8ac07124315f36db78c157ed5d2c3d7ed75120ecc4d0d4a6622de2a98f587c16
MD5 hash:
2f1ae78cae116a020760f54479c3e9b3
SHA1 hash:
433fe2252e21043a302af27a6a0741499cefd4ed
SH256 hash:
0c2ade2993927f6de828e30c07156c19751b55650a05c965631ca0ea1c983498
MD5 hash:
cc0d6b6813f92dbf5be3ecacf44d662a
SHA1 hash:
b968c57a14ddada4128356f6e39fb66c6d864d3f
SH256 hash:
55361941ab12c7edd987c706d25423d868f756fab1028d99eeffacdabf3da4ca
MD5 hash:
4de4b7bc0a92902422c4204fcfa58150
SHA1 hash:
587e0299ea32cc836281998941daa60f471e3480
SH256 hash:
40ca14be87ccee1c66cce8ce07d7ed9b94a0f7b46d84f9147c4bbf6ddab75a67
MD5 hash:
7165e9d7456520d1f1644aa26da7c423
SHA1 hash:
177f9116229a021e24f80c4059999c4c52f9e830
SH256 hash:
574a1e8093a8a16ebc96234701b1b14851f0c3bd2d5d5f687be59ac09b6554f3
MD5 hash:
08ff8f4643d75e0e160dfe7d9c9c006a
SHA1 hash:
890c655b9b28e0ac6bac1c8666b5b4be47011867
SH256 hash:
10a122bd647c88aa23f96687e26b251862e83be9dbb89532f4a578689547972d
MD5 hash:
89c739ae3bbee8c40a52090ad0641d31
SHA1 hash:
d0f7dc9a0a3e52af0f9f9736f26e401636c420a1
SH256 hash:
ee6e4247ff5b109a56bf2c40de60018169ab4123b6a2216fc22655bb6decf1ba
MD5 hash:
a1ebaa47fb074822a5fb36913fa084a4
SHA1 hash:
fb7e56e98938004972598531438d0ee35ac4f012
SH256 hash:
95942ed494572ec8d2bec3c988ec35d546cfd5e772cdd367f58f6831b83b66a5
MD5 hash:
28d7ad7743a5cb7e82c92c7a2277d0ea
SHA1 hash:
ddbde66b6099a30f2e7f2db4bbbb7ce1eb1b88a1
SH256 hash:
25e34835d49855c6bb8b02c69a41967af5197ec2e19c2601c453399dd6243a05
MD5 hash:
f652191f792f2c2e54f57560144b3018
SHA1 hash:
ccde7f07fe3e705f672739f752a0a4b9e9d14d25
SH256 hash:
478263088ffb855449dfcdc3d48a14ee0c07a22ceb8a8efd0ccd0a4e7f3bc565
MD5 hash:
54a2fe337871b940aadc1b3ad986fa3e
SHA1 hash:
306dc36931b41d55a8b723c04c4ae1f729fd6801
SH256 hash:
67cdc7c5de5e46229adc831dc6fd3053d996ecf02e94706b6b6ae1b0ed976f2c
MD5 hash:
555b5b60b2dcc53e71e6d9ba8302c4b9
SHA1 hash:
550326b1226629a867d4606ad0c98c4ef9596b47
SH256 hash:
de0c97be7a399749f3cdf7492f08026485be13a71b11d32c414693368846e765
MD5 hash:
dfd072e6d9aca629c5690c37a5a6275b
SHA1 hash:
9493ecc2b109d0738a0d155049bfd6093ee961f3
SH256 hash:
339176bd6b74c31c1d3cf6f750b188a1c73018c18131ff6626a8f4bd390f3bee
MD5 hash:
600de1f5a876d3a2c41728f90aadcd34
SHA1 hash:
0b432fee1fca63b1d4fe27febf28c2750d05ae82
Detections:
win_socelars_auto
SH256 hash:
55cdb9054f66ed88b8215d9f981efd7421c6f50dc9285140ec5ff591e34121bd
MD5 hash:
5631522a0758055c133e7966c1948802
SHA1 hash:
90caf8180bf43727fc490ffa34b1d578833aad7f
SH256 hash:
28429b5c4b8ed3a8878fb89cca1b64bc4cf222976f778e804a1ed52c6f744e10
MD5 hash:
a8ab17fca9a3868e4a84d3f1e62ffbcc
SHA1 hash:
be3e1044216c6fa67343e81762e4894dc108cc99
SH256 hash:
fb7fc44709ef2681789e63f5493e72ed7e465b1ef405d480430ceb7ed2c3d02f
MD5 hash:
f4ec00f351abd8c8e8b48cbf13289182
SHA1 hash:
c7068f3f3c2fd827d90760aed0f33a198c1b8368
SH256 hash:
fe8417ad3e0bad396fd009f20ad6cb106605098ec72fb933bb6f8e16cb6d437d
MD5 hash:
c67fddcbcfda1b6799b8a763c13b531a
SHA1 hash:
166359124345a00d6f14c0057ff9801f3cd76e7a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:Email_stealer_bin_mem
Author:James_inthe_box
Description:Email in files like avemaria
Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_HyperBro03
Author:ditekSHen
Description:Hunt HyperBro IronTiger / LuckyMouse / APT27 malware
Rule name:MALWARE_Win_Raccoon
Author:ditekSHen
Description:Detects Raccoon/Racealer infostealer
Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments