MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 044ad6b6f53c1b7c41a1bcac4b9919bbb0035531de0b9cfd2208cba409d801ba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 4 File information Comments

SHA256 hash: 044ad6b6f53c1b7c41a1bcac4b9919bbb0035531de0b9cfd2208cba409d801ba
SHA3-384 hash: b1a12e8761746f2784e2cfb82d4ac69ca86ebea752516e2c6ed41a9b9643743340bd16ba67d7c331afdd87a200b11578
SHA1 hash: 8636b60f70e0b542e6cb7c1ef767c6fddf20e235
MD5 hash: a7e955c7dd7b3e2cd3d5d308987207f1
humanhash: magnesium-magnesium-india-dakota
File name:044ad6b6f53c1b7c41a1bcac4b9919bbb0035531de0b9.exe
Download: download sample
Signature RedLineStealer
File size:4'385'280 bytes
First seen:2021-11-22 13:01:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e48cc266501c282987b27f2c1f654e2d (52 x RedLineStealer, 3 x RaccoonStealer)
ssdeep 98304:93jLviUsV1dQlVO/ydfTLvcbCjSd27Sv4e6JMPtT9yq2wy:9TRsV12lnBTLv0Cj6bX7x2b
Threatray 185 similar samples on MalwareBazaar
TLSH T13816337D1094F61BC21C78B00B8BBA44C684D1A0DD573DEB7A16CB8AC9AD6A0F5173F6
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.224.134.182:16014

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.224.134.182:16014 https://threatfox.abuse.ch/ioc/252063/

Intelligence


File Origin
# of uploads :
1
# of downloads :
118
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
044ad6b6f53c1b7c41a1bcac4b9919bbb0035531de0b9.exe
Verdict:
Suspicious activity
Analysis date:
2021-11-23 00:18:00 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Searching for the window
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-11-22 13:02:22 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Unpacked files
SH256 hash:
352ecefae273ee081a70294ce3af47dd2e1aad8056e71e9c824abb32713b0eee
MD5 hash:
64fbbe39a91313e70a7faa6a311be50d
SHA1 hash:
bec693106de7545fa2054764afeec540873f4462
SH256 hash:
044ad6b6f53c1b7c41a1bcac4b9919bbb0035531de0b9cfd2208cba409d801ba
MD5 hash:
a7e955c7dd7b3e2cd3d5d308987207f1
SHA1 hash:
8636b60f70e0b542e6cb7c1ef767c6fddf20e235
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments