MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff99fd8d3c6207711c6ec61de4b491963b1931db0fbd75ea3b4e30f5df482c2b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 7 File information Comments

SHA256 hash: ff99fd8d3c6207711c6ec61de4b491963b1931db0fbd75ea3b4e30f5df482c2b
SHA3-384 hash: abd770f6ebbd063d2b96c408a351da6915f395559ff6aacda03c974b232cd895fa32713f81343e3279fca9c05eec82a4
SHA1 hash: 53f8ddf64222e39ef7bbd9d8a9ef9ce574e29236
MD5 hash: 0c9229e2a4bbdbf3bdd91b7d4ac4fc5d
humanhash: emma-zebra-uncle-cardinal
File name:0c9229e2a4bbdbf3bdd91b7d4ac4fc5d.exe
Download: download sample
Signature RedLineStealer
File size:943'904 bytes
First seen:2023-12-09 18:00:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e67fae7208c4ff253bfc762c234e05b1 (4 x RedLineStealer, 1 x DarkCloud, 1 x LummaStealer)
ssdeep 12288:pN50r3mvLhHGfGwjWG4mgkKmWeYk9KSMTVSmTckxcCulrZ4Ait:far3OhHGfGwjWG4mesYkY1BSmvcUt
Threatray 4'395 similar samples on MalwareBazaar
TLSH T188158C2138C49072EEE220B747ECBA7E46ADE4B4071906CF06D857EED7606C17F36696
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
82.115.223.152:3838

Intelligence


File Origin
# of uploads :
1
# of downloads :
312
Origin country :
NL NL
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
DNS request
Creating a file in the %temp% directory
Creating a process from a recently created file
Sending an HTTP GET request
Creating a window
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process with a hidden window
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP POST request to an infection source
Gathering data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control darkcloud lolbin overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Glupteba, LummaC Stealer, PureLog Steale
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
UAC bypass detected (Fodhelper)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected Glupteba
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1356978 Sample: rdU3cg9xmI.exe Startdate: 09/12/2023 Architecture: WINDOWS Score: 100 112 runeelite.com 2->112 114 medicinebuckerrysa.pw 2->114 116 2 other IPs or domains 2->116 140 Snort IDS alert for network traffic 2->140 142 Multi AV Scanner detection for domain / URL 2->142 144 Found malware configuration 2->144 146 19 other signatures 2->146 12 rdU3cg9xmI.exe 2->12         started        15 oXnyHd.exe 2->15         started        17 svchost.exe 40 2->17         started        19 3 other processes 2->19 signatures3 process4 dnsIp5 184 Contains functionality to inject code into remote processes 12->184 186 Writes to foreign memory regions 12->186 188 Allocates memory in foreign processes 12->188 190 Injects a PE file into a foreign processes 12->190 22 AppLaunch.exe 12->22         started        25 WerFault.exe 22 16 12->25         started        27 AppLaunch.exe 12->27         started        192 Multi AV Scanner detection for dropped file 15->192 29 WerFault.exe 2 17->29         started        118 127.0.0.1 unknown unknown 19->118 signatures6 process7 signatures8 176 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 22->176 178 Maps a DLL or memory area into another process 22->178 180 Checks if the current machine is a virtual machine (disk enumeration) 22->180 182 Creates a thread in another existing process (thread injection) 22->182 31 explorer.exe 64 24 22->31 injected process9 dnsIp10 128 91.92.247.96 THEZONEBG Bulgaria 31->128 130 185.196.8.238 SIMPLECARRER2IT Switzerland 31->130 132 4 other IPs or domains 31->132 80 C:\Users\user\AppData\Roaming\vdgdahf, PE32 31->80 dropped 82 C:\Users\user\AppData\Local\Temp\F891.exe, PE32 31->82 dropped 84 C:\Users\user\AppData\Local\Temp\F515.exe, PE32 31->84 dropped 86 8 other files (7 malicious) 31->86 dropped 134 System process connects to network (likely due to code injection or exploit) 31->134 136 Benign windows process drops PE files 31->136 138 Hides that the sample has been downloaded from the Internet (zone.identifier) 31->138 36 2E28.exe 31->36         started        40 F515.exe 5 31->40         started        42 550C.exe 31->42         started        44 2 other processes 31->44 file11 signatures12 process13 dnsIp14 88 C:\Users\user\AppData\Local\Temp\tuc3.exe, PE32 36->88 dropped 90 C:\Users\user\AppData\Local\...\toolspub2.exe, PE32 36->90 dropped 92 C:\Users\user\AppData\Local\...\latestX.exe, PE32+ 36->92 dropped 102 2 other malicious files 36->102 dropped 158 Antivirus detection for dropped file 36->158 160 Multi AV Scanner detection for dropped file 36->160 162 Machine Learning detection for dropped file 36->162 47 toolspub2.exe 36->47         started        50 31839b57a4f11171d6abc8bbc4451ee4.exe 36->50         started        52 tuc3.exe 36->52         started        64 3 other processes 36->64 94 C:\Users\user\AppData\Roaming\...\File2.exe, PE32 40->94 dropped 96 C:\Users\user\AppData\Roaming\...\File1.exe, PE32 40->96 dropped 55 File2.exe 40->55         started        58 File1.exe 40->58         started        60 conhost.exe 40->60         started        164 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 42->164 166 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 42->166 168 Modifies the context of a thread in another process (thread injection) 42->168 62 550C.exe 42->62         started        126 77.105.132.87 PLUSTELECOM-ASRU Russian Federation 44->126 98 C:\Users\user\AppData\Roaming\oXnyHd.exe, PE32 44->98 dropped 100 C:\Users\user\AppData\Local\...\tmp99E1.tmp, XML 44->100 dropped 170 Found many strings related to Crypto-Wallets (likely being stolen) 44->170 172 Uses schtasks.exe or at.exe to add and modify task schedules 44->172 174 Injects a PE file into a foreign processes 44->174 66 4 other processes 44->66 file15 signatures16 process17 dnsIp18 194 Multi AV Scanner detection for dropped file 47->194 196 Detected unpacking (changes PE section rights) 47->196 198 Injects a PE file into a foreign processes 47->198 68 toolspub2.exe 47->68         started        200 Antivirus detection for dropped file 50->200 202 Detected unpacking (overwrites its own PE header) 50->202 204 UAC bypass detected (Fodhelper) 50->204 218 2 other signatures 50->218 104 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 52->104 dropped 71 tuc3.tmp 52->71         started        120 176.123.7.190, 32927, 49720 ALEXHOSTMD Moldova Republic of 55->120 206 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 55->206 208 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 55->208 210 Tries to harvest and steal browser information (history, passwords, etc) 55->210 212 Tries to steal Crypto Currency Wallets 55->212 122 176.123.10.211, 47430, 49719 ALEXHOSTMD Moldova Republic of 58->122 214 Found many strings related to Crypto-Wallets (likely being stolen) 58->214 106 C:\Users\user\...\ContextProperties.exe, PE32+ 62->106 dropped 108 C:\Users\user\AppData\Local\Temp\Broom.exe, PE32 64->108 dropped 216 Machine Learning detection for dropped file 64->216 73 Broom.exe 64->73         started        124 medicinebuckerrysa.pw 104.21.72.68 CLOUDFLARENETUS United States 66->124 75 conhost.exe 66->75         started        file19 signatures20 process21 signatures22 148 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 68->148 150 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 68->150 152 Maps a DLL or memory area into another process 68->152 156 2 other signatures 68->156 77 tuc3.exe 71->77         started        154 Multi AV Scanner detection for dropped file 73->154 process23 file24 110 C:\Users\user\AppData\Local\Temp\...\tuc3.tmp, PE32 77->110 dropped
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-12-07 02:36:57 UTC
File Type:
PE (Exe)
AV detection:
20 of 23 (86.96%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:smokeloader backdoor trojan
Behaviour
Checks SCSI registry key(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Program crash
Suspicious use of SetThreadContext
SmokeLoader
Malware Config
C2 Extraction:
http://81.19.131.34/fks/index.php
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments