MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06ab182676df4dc930c899c9b22934531c0e89773959bdc742169ce9c071748d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 06ab182676df4dc930c899c9b22934531c0e89773959bdc742169ce9c071748d
SHA3-384 hash: a2c04d1c54fa2a6f1c775473a7c069480b5345398ca70faa0b1aac523b4d350089da81a8fc19e55186ca5e8ce390f2dc
SHA1 hash: 354ac87d46902c2411c5c2ad9bcfb3ac51ab47ff
MD5 hash: 1f9e90868510f2f51b5dadf78068d76b
humanhash: sad-glucose-winner-jersey
File name:file
Download: download sample
Signature RedLineStealer
File size:369'664 bytes
First seen:2022-10-19 16:10:02 UTC
Last seen:2022-10-21 15:18:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 62fa6140919ca43688c707cc0e676ecc (3 x RedLineStealer)
ssdeep 6144:d2CwfXZIihPkyu+jLpHcJZFDAOCdaSPcj+wyuqtqK3FwYolC:4/fXZIihPky/ecP2NqtqK3Fwm
Threatray 499 similar samples on MalwareBazaar
TLSH T17774AE00F491C43DD872B0311CEAC6F9562DA910039B49EB63EECA6D7F24DED6E32566
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from https://vk.com/doc32384019_646102941?hash=7Fe7kAswlCgTK8j8VU0hlsi81VXq5VoRvLUUxSMykTX&dl=GMZDGOBUGAYTS:1666194937:2bqNSsi5a2kRUjn4U6z3keeWFgCGvIT8fznBCt659YX&api=1&no_preview=1#1

Intelligence


File Origin
# of uploads :
709
# of downloads :
252
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-10-19 16:10:39 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a file in the system32 subdirectories
Creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Raccoon Stealer v2, RedLine, Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates files in the system32 config directory
Detected unpacking (changes PE section rights)
Found evasive API chain (may stop execution after checking mutex)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Hijacks the control flow in another process
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Potential malicious VBS script found (suspicious strings)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses known network protocols on non-standard ports
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 726253 Sample: file.exe Startdate: 19/10/2022 Architecture: WINDOWS Score: 100 170 Snort IDS alert for network traffic 2->170 172 Multi AV Scanner detection for domain / URL 2->172 174 Malicious sample detected (through community Yara rule) 2->174 176 16 other signatures 2->176 11 file.exe 2->11         started        14 updater.exe 2->14         started        17 MoUSO.exe 2->17         started        process3 file4 224 Contains functionality to inject code into remote processes 11->224 226 Writes to foreign memory regions 11->226 228 Allocates memory in foreign processes 11->228 230 Injects a PE file into a foreign processes 11->230 19 RegSvcs.exe 15 7 11->19         started        136 C:\Windows\Temp\6742.tmp, PE32+ 14->136 dropped 138 C:\Windows\Temp\6136.tmp, PE32+ 14->138 dropped 140 C:\Program Filesbehaviorgraphoogle\Libs\WR64.sys, PE32+ 14->140 dropped 232 Query firmware table information (likely to detect VMs) 14->232 234 Modifies the context of a thread in another process (thread injection) 14->234 236 Adds a directory exclusion to Windows Defender 14->236 246 3 other signatures 14->246 24 cmd.exe 14->24         started        26 powershell.exe 14->26         started        28 cmd.exe 14->28         started        30 powershell.exe 14->30         started        238 Multi AV Scanner detection for dropped file 17->238 240 Tries to detect sandboxes and other dynamic analysis tools (window names) 17->240 242 Tries to evade debugger and weak emulator (self modifying code) 17->242 244 Tries to detect virtualization through RDTSC time measurements 17->244 signatures5 process6 dnsIp7 142 51.89.201.21, 49699, 7161 OVHFR France 19->142 144 cdn.discordapp.com 162.159.130.233, 443, 49700, 49701 CLOUDFLARENETUS United States 19->144 108 C:\Users\user\AppData\Local\Temp\setu2p.exe, PE32+ 19->108 dropped 188 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->188 190 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->190 192 Tries to harvest and steal browser information (history, passwords, etc) 19->192 194 Tries to steal Crypto Currency Wallets 19->194 32 setu2p.exe 19->32         started        196 Modifies power options to not sleep / hibernate 24->196 35 conhost.exe 24->35         started        37 powercfg.exe 24->37         started        47 2 other processes 24->47 198 Creates files in the system32 config directory 26->198 39 conhost.exe 26->39         started        41 conhost.exe 28->41         started        43 sc.exe 28->43         started        49 3 other processes 28->49 45 conhost.exe 30->45         started        file8 signatures9 process10 signatures11 162 Hijacks the control flow in another process 32->162 164 Writes to foreign memory regions 32->164 166 Allocates memory in foreign processes 32->166 168 2 other signatures 32->168 51 RegSvcs.exe 24 32->51         started        process12 dnsIp13 146 github.com 140.82.121.3, 443, 49707 GITHUBUS United States 51->146 148 objects.githubusercontent.com 185.199.108.133, 443, 49708 FASTLYUS Netherlands 51->148 150 cdn.discordapp.com 51->150 110 C:\Users\user\AppData\Local\...\watchdog.exe, PE32 51->110 dropped 112 C:\Users\user\AppData\Local\...\setup3221.exe, PE32 51->112 dropped 114 C:\Users\user\AppData\Local\...\setup32.exe, PE32+ 51->114 dropped 116 5 other malicious files 51->116 dropped 55 setup32.exe 1 51->55         started        59 setup3221.exe 51->59         started        61 setup.exe 18 51->61         started        64 watchdog.exe 51->64         started        file14 process15 dnsIp16 118 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 55->118 dropped 120 C:\Windows\System32\drivers\etc\hosts, ISO-8859 55->120 dropped 200 Antivirus detection for dropped file 55->200 202 Multi AV Scanner detection for dropped file 55->202 204 Query firmware table information (likely to detect VMs) 55->204 220 4 other signatures 55->220 66 cmd.exe 55->66         started        69 cmd.exe 55->69         started        71 powershell.exe 55->71         started        85 2 other processes 55->85 122 C:\Windows\Temp\222.exe, PE32 59->122 dropped 206 Potential malicious VBS script found (suspicious strings) 59->206 208 Machine Learning detection for dropped file 59->208 73 222.exe 59->73         started        76 wscript.exe 59->76         started        160 dba692117be7b6d3480fe5220fdd58b38bf.xyz 172.67.222.84, 443, 49704, 49705 CLOUDFLARENETUS United States 61->160 124 C:\Users\user\AppData\Local\cache\MoUSO.exe, PE32 61->124 dropped 210 Detected unpacking (changes PE section rights) 61->210 212 Found evasive API chain (may stop execution after checking mutex) 61->212 214 Performs DNS queries to domains with low reputation 61->214 222 4 other signatures 61->222 79 schtasks.exe 1 61->79         started        216 Writes to foreign memory regions 64->216 218 Injects a PE file into a foreign processes 64->218 81 vbc.exe 64->81         started        83 conhost.exe 64->83         started        file17 signatures18 process19 dnsIp20 178 Uses cmd line tools excessively to alter registry or file data 66->178 180 Uses powercfg.exe to modify the power settings 66->180 182 Modifies power options to not sleep / hibernate 66->182 87 conhost.exe 66->87         started        102 10 other processes 66->102 104 5 other processes 69->104 106 2 other processes 71->106 126 C:\Users\user\AppData\...\2.0.2-beta.exe, PE32 73->126 dropped 89 2.0.2-beta.exe 73->89         started        154 iplogger.com 148.251.234.93, 443, 49709 HETZNER-ASDE Germany 76->154 184 System process connects to network (likely due to code injection or exploit) 76->184 186 May check the online IP address of the machine 76->186 94 conhost.exe 79->94         started        156 79.137.192.6, 49711, 49714, 8362 PSKSET-ASRU Russian Federation 81->156 158 api.ip.sb 81->158 96 conhost.exe 81->96         started        98 conhost.exe 85->98         started        100 conhost.exe 85->100         started        file21 signatures22 process23 dnsIp24 152 77.73.133.7, 49710, 80 AS43260TR Kazakhstan 89->152 128 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 89->128 dropped 130 C:\Users\user\AppData\LocalLow\softokn3.dll, PE32 89->130 dropped 132 C:\Users\user\AppData\LocalLow\nss3.dll, PE32 89->132 dropped 134 4 other files (2 malicious) 89->134 dropped 248 Antivirus detection for dropped file 89->248 250 Multi AV Scanner detection for dropped file 89->250 252 Tries to harvest and steal browser information (history, passwords, etc) 89->252 254 Tries to steal Crypto Currency Wallets 89->254 file25 signatures26
Threat name:
Win32.Infostealer.Bandra
Status:
Malicious
First seen:
2022-10-19 16:17:09 UTC
File Type:
PE (Exe)
AV detection:
18 of 26 (69.23%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
06ab182676df4dc930c899c9b22934531c0e89773959bdc742169ce9c071748d
MD5 hash:
1f9e90868510f2f51b5dadf78068d76b
SHA1 hash:
354ac87d46902c2411c5c2ad9bcfb3ac51ab47ff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments