MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 014d9e246efaad3a91e21a36303842275f2b767245e3989143a75995babb653e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA File information Comments

SHA256 hash: 014d9e246efaad3a91e21a36303842275f2b767245e3989143a75995babb653e
SHA3-384 hash: a72048b0292f9f9c774a17ce9bbe2bcb6d1fe5f190240250aeb3f884aa9b8a9cc6cd5328aba99be068884dc55732d477
SHA1 hash: f8fbc01d3a8203d4623609011ed0ccd2ce5133dd
MD5 hash: 832c2e7384f4332a3dbe91ce0f0a8da0
humanhash: william-delta-three-king
File name:832c2e7384f4332a3dbe91ce0f0a8da0.exe
Download: download sample
Signature RedLineStealer
File size:404'992 bytes
First seen:2022-01-20 06:36:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 125adc129c50285a2cd4524417d3fdd8 (11 x RedLineStealer, 2 x Smoke Loader, 2 x ArkeiStealer)
ssdeep 6144:jwDbLbV2YtYleLndyQ40oaOZZANNx5pJoPqlOn/2H0wMpHs:jw3l2Yt8eLnkq9OZaNnpJIe0wn
Threatray 4'466 similar samples on MalwareBazaar
TLSH T1CB84E0F07580E931C4865A32C41ACFA11EBEFC710866964377A43B6EBE726C1636725F
File icon (PE):PE icon
dhash icon fcfcb4b4b4d4d9c1 (24 x RedLineStealer, 10 x Smoke Loader, 4 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.9.20.111:1355

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.9.20.111:1355 https://threatfox.abuse.ch/ioc/303028/

Intelligence


File Origin
# of uploads :
1
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-01-20 07:19:01 UTC
AV detection:
24 of 27 (88.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Checks installed software on the system
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
ccf2a17a23a01fe16ea37413010d2d845aac780c9fb534491ef177c0d67016dc
MD5 hash:
4ed3c840e3f554f5f6c0ac741f4e02b4
SHA1 hash:
b775d1fa3fc54de998025bedd9e24d6f76bd5164
SH256 hash:
5b75832f6fc38242618176c8acbca8795b722282aaeaeebffbc6752eabc7dd23
MD5 hash:
3dbe3099613073992b69bb52b4f0a0f8
SHA1 hash:
ade1dc6acff6a3babfe86fffa73c2b8e28efb87d
SH256 hash:
6f1b3f902f153ac2c41b58cd2faed0698993cf6c38b726e8a3112ecde80c7a68
MD5 hash:
afb109167a037d3bc519538a433f4f6b
SHA1 hash:
51a10bbff21cc9e47535368a77032fa31a09e0f1
SH256 hash:
014d9e246efaad3a91e21a36303842275f2b767245e3989143a75995babb653e
MD5 hash:
832c2e7384f4332a3dbe91ce0f0a8da0
SHA1 hash:
f8fbc01d3a8203d4623609011ed0ccd2ce5133dd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 014d9e246efaad3a91e21a36303842275f2b767245e3989143a75995babb653e

(this sample)

  
Delivery method
Distributed via web download

Comments