MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 01b03e3685fc9fa6d7c59ddf16457c45c27e78cb09b9800e0689a23989c0d047. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA File information Comments

SHA256 hash: 01b03e3685fc9fa6d7c59ddf16457c45c27e78cb09b9800e0689a23989c0d047
SHA3-384 hash: 33777c7b394189dc40f33cd2e7d294da1053d78451618b62288d21adc4421cce564f85f31a17f5351d29e33ed9d44191
SHA1 hash: 2d8a25ea7ad5f54bf22f5a4121ae672d4b53bace
MD5 hash: 5b6c9bdb605a9ef8685e08998b24368b
humanhash: wolfram-edward-delaware-skylark
File name:01b03e3685fc9fa6d7c59ddf16457c45c27e78cb09b98.exe
Download: download sample
Signature RedLineStealer
File size:457'728 bytes
First seen:2021-09-29 03:26:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7182b1ea6f92adbf459a2c65d8d4dd9e (5 x CoinMiner, 4 x RedLineStealer, 4 x DCRat)
ssdeep 12288:IbjDhu9TMsp4asV+MfbX50+TTZAcTKuS0+KW3j:21eTMsKBf1VTYKW3j
Threatray 66 similar samples on MalwareBazaar
TLSH T148A4F06772E40195DBB142FAC8A1034AE77034361B55A3CB5B6863B32B2F4DA9F3D391
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
80.87.192.137:27018

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
80.87.192.137:27018 https://threatfox.abuse.ch/ioc/227545/

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
071f6bd61aef9f209be1bfb16ef1fb14bd44804fcab511b129deeb7822948ef9.exe
Verdict:
Malicious activity
Analysis date:
2021-09-29 03:26:13 UTC
Tags:
trojan evasion phishing opendir loader stealer vidar rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the Windows subdirectories
Deleting a recently created file
Replacing files
Using the Windows Management Instrumentation requests
Creating a file
Reading critical registry keys
Stealing user critical data
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected BatToExe compiled binary
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 492932 Sample: 01b03e3685fc9fa6d7c59ddf164... Startdate: 29/09/2021 Architecture: WINDOWS Score: 60 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected BatToExe compiled binary 2->30 7 01b03e3685fc9fa6d7c59ddf16457c45c27e78cb09b98.exe 9 2->7         started        process3 file4 22 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 7->22 dropped 10 cmd.exe 3 7->10         started        process5 process6 12 extd.exe 2 10->12         started        16 extd.exe 2 10->16         started        18 conhost.exe 10->18         started        20 extd.exe 1 10->20         started        dnsIp7 24 cdn.discordapp.com 162.159.133.233, 443, 49728 CLOUDFLARENETUS United States 12->24 32 Multi AV Scanner detection for dropped file 12->32 26 162.159.130.233, 443, 49737 CLOUDFLARENETUS United States 16->26 signatures8
Threat name:
Win64.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-29 03:27:15 UTC
AV detection:
21 of 45 (46.67%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer upx
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
Malware Config
C2 Extraction:
80.87.192.137:27018
Unpacked files
SH256 hash:
01b03e3685fc9fa6d7c59ddf16457c45c27e78cb09b9800e0689a23989c0d047
MD5 hash:
5b6c9bdb605a9ef8685e08998b24368b
SHA1 hash:
2d8a25ea7ad5f54bf22f5a4121ae672d4b53bace
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments