MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02f2ddecb8e2761b0ecc346ec43dc12c05661f938331f6f4cc0b8703a9388224. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 02f2ddecb8e2761b0ecc346ec43dc12c05661f938331f6f4cc0b8703a9388224
SHA3-384 hash: 12d25ac2e72e97009818184f3f2419ed41ce8010a7bfb5b2f1c906c85edebdfaf042d6ad47a6b6025098c7a40b53e49b
SHA1 hash: 154049870b84a7865181efae2e0e02b9ea63d9be
MD5 hash: be5a217876c992659c0223470b981b9c
humanhash: winner-mirror-hotel-lactose
File name:53660416.exe
Download: download sample
Signature RedLineStealer
File size:1'459'872 bytes
First seen:2022-03-22 19:19:46 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 57b4688c454480cc1bf2337299d38c69 (1 x RedLineStealer)
ssdeep 24576:vcoq1jaXVPuMA20y40Ej78AEkgfrOwAo6RQcxdW3NoV5HoBNooH8MpCFRJCv2fFA:vcb1GE20d5ERfybxquHobl8MIRu
Threatray 4'508 similar samples on MalwareBazaar
TLSH T18F65337AAD0CD785CD026AB7702E5F284247DA770E5F6B086219980CEC4D3F9615AF2E
Reporter adm1n_usa32
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Searching for analyzing tools
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Reading critical registry keys
Sending a custom TCP request
Running batch commands
Creating a process with a hidden window
Query of malicious DNS domain
Sending a TCP request to an infection source
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-03-04 16:24:04 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:gb3 discovery infostealer spyware stealer
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
elew3le3lanle.freeddns.org:4633
Unpacked files
SH256 hash:
d4b7ba75aadffe537451416f799aec9abea0bdec5e0ae7a018d17c9ed69191b8
MD5 hash:
ac48c2d06dda274f0f1233c96e9b00a7
SHA1 hash:
bf0825cee5dc902bdb81fccf9a4ae56e89107375
SH256 hash:
02f2ddecb8e2761b0ecc346ec43dc12c05661f938331f6f4cc0b8703a9388224
MD5 hash:
be5a217876c992659c0223470b981b9c
SHA1 hash:
154049870b84a7865181efae2e0e02b9ea63d9be
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 02f2ddecb8e2761b0ecc346ec43dc12c05661f938331f6f4cc0b8703a9388224

(this sample)

  
Delivery method
Distributed via web download

Comments