MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 06b795cf4007dfabb39adc54728d7bc4dabde17ff340ebac4e870856a1741fb7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 8 File information Comments

SHA256 hash: 06b795cf4007dfabb39adc54728d7bc4dabde17ff340ebac4e870856a1741fb7
SHA3-384 hash: 3d069b835bd29eacc4ab24d0953f5e490ff4d9ccf2ea7a57b4bc102ff96f9e9de5b822196cb49a977c5be9f55cb8ec93
SHA1 hash: 455849521e12028f82463c7d0985175a6eb4fb36
MD5 hash: 315f5b3a3ecb3ad633df049fe5ad7514
humanhash: table-triple-august-vegan
File name:315F5B3A3ECB3AD633DF049FE5AD7514.exe
Download: download sample
Signature RedLineStealer
File size:4'837'916 bytes
First seen:2021-08-18 21:51:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ced282d9b261d1462772017fe2f6972b (127 x Formbook, 113 x GuLoader, 70 x RemcosRAT)
ssdeep 98304:xTcd+BiZ8dYhBvtCaF5/icT2mRuNUbOsTBhHPLnog3:5c/8dYfvtCiFi02mjdfvt
Threatray 31 similar samples on MalwareBazaar
TLSH T171262393488D8BCFE9210B3F43663131D66B8FB8F1F996CE97BBDC6969150520D87812
dhash icon 3279d4b6b6d47132 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.84.1.79:56124

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.84.1.79:56124 https://threatfox.abuse.ch/ioc/192179/

Intelligence


File Origin
# of uploads :
1
# of downloads :
137
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
315F5B3A3ECB3AD633DF049FE5AD7514.exe
Verdict:
Malicious activity
Analysis date:
2021-08-18 21:52:54 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a file in the %temp% subdirectories
Creating a window
Enabling the 'hidden' option for files in the %temp% directory
Sending a UDP request
Creating a file
Connection attempt
Sending an HTTP POST request
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Deleting a recently created file
Reading critical registry keys
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
60 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected AntiVM3
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 467843 Sample: wd2ovP1Q2A.exe Startdate: 18/08/2021 Architecture: WINDOWS Score: 60 49 Found malware configuration 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 Yara detected RedLine Stealer 2->53 55 6 other signatures 2->55 8 wd2ovP1Q2A.exe 9 2->8         started        process3 file4 29 C:\Users\user\AppData\Roaming\dabby.exe, PE32 8->29 dropped 31 C:\Users\user\...\DriverEasy.5.7.0.39488.exe, PE32 8->31 dropped 11 dabby.exe 3 8->11         started        14 DriverEasy.5.7.0.39488.exe 2 8->14         started        process5 dnsIp6 61 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->61 63 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 11->63 65 Injects a PE file into a foreign processes 11->65 18 dabby.exe 15 29 11->18         started        22 dabby.exe 11->22         started        47 5.7.0.39 TDDE-ASN1DE Germany 14->47 41 C:\Users\user\...\DriverEasy.5.7.0.39488.tmp, PE32 14->41 dropped 24 DriverEasy.5.7.0.39488.tmp 26 45 14->24         started        file7 signatures8 process9 dnsIp10 43 45.84.1.79, 49717, 49721, 49722 WEBHOST1-ASRU Russian Federation 18->43 45 api.ip.sb 18->45 57 Tries to harvest and steal browser information (history, passwords, etc) 18->57 59 Tries to steal Crypto Currency Wallets 18->59 27 conhost.exe 18->27         started        33 C:\Users\user\AppData\...\iswin7logo.dll, PE32 24->33 dropped 35 C:\Users\user\AppData\Local\...\botva2.dll, PE32 24->35 dropped 37 C:\Users\user\AppData\Local\Temp\...\b2p.dll, PE32 24->37 dropped 39 29 other files (none is malicious) 24->39 dropped file11 signatures12 process13
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2021-08-16 21:49:28 UTC
AV detection:
23 of 46 (50.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:13.08 discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
45.84.1.79:56124
Unpacked files
SH256 hash:
42fa16c9d9014e26858fe9b4cb3d36c375375560e2f6a3bfea0b33710f89f261
MD5 hash:
a715eb7da02e9a35954c337f1af4357e
SHA1 hash:
f5685d72a12308f5ad0874ed6b068148b886ae40
SH256 hash:
dfe25e9c801f828df9fb5e3baee41651ba72c1e00634be4b648d72f1ad8599e7
MD5 hash:
559ec2666c1b2a509aebf1cfd182add8
SHA1 hash:
d9fe1a0fc77eee967de02606f87c5a8c5c6d7729
SH256 hash:
1b703b0545b27c23921b3953f10acdb943db25a406d110d4f50120e5a6553d58
MD5 hash:
8c023fe5726daf6a14e6ec963d8a10a7
SHA1 hash:
d92ac2d1abd8f6a9379c0ab6fd6b3c38ff7906b9
SH256 hash:
55a7b6e88f03528c8cdcc4cfff9a7e5efce3c9d3d21023ef2b37aa228b530ddc
MD5 hash:
850d12295447dbcd9e38a073aef72fb6
SHA1 hash:
bb8e998ed8b2e07d5ffec82509019df134468643
SH256 hash:
a9c78e25952d72a1d27975cefcfe30c61b36e2dfc5057b810f037ea02b4a3d57
MD5 hash:
dd08ed5839252d79e27a3712f3f1536b
SHA1 hash:
b5b899f064b5e940779402c38e9ced82e9f84c2e
SH256 hash:
53d3b08f6b3a2cbbfdfd763e3efafd7acf33e641d73ea2d65dd6950aa7d5f72b
MD5 hash:
e1ba35dc85f8e5443d783a0336f7b51f
SHA1 hash:
996b13f8330f02fc1fca92577bee65efa7b85677
SH256 hash:
89b5030a8272a67ce36b279273da26c8e0495b89f9499dfe9a249e6105efaa77
MD5 hash:
56f55ac335d7b1ea6049c89ef20b2ba0
SHA1 hash:
6df8932e6e91fff7b7e053c2ffb1c4a2b49fdef1
SH256 hash:
e60d85e3225aad5397513fb3a1247da025c0602e233587c1193258dae92ead68
MD5 hash:
b41745d1c49c1b5327ad465151649793
SHA1 hash:
56035a9c146858082bb52aeb20d44e7e55dc18d1
SH256 hash:
70d3d71a330c2695fbc32e6748fa0fd7efc0d4d8ddf0d14e89fd8d38159e07ec
MD5 hash:
74c930c33f869a38cfe622769ac53b27
SHA1 hash:
51c39ca6392bc160aefcb4ff748dedc8579918b6
SH256 hash:
e3b69cb62d2be0dd4a7cc8c7b3de17adf50aea4e4ad0a8d05c1d2a5c6bdad47a
MD5 hash:
0b9d6249615b5fe89a9f2c3add205992
SHA1 hash:
449ef8652d6a43a2ed649f095d974679f7351bac
SH256 hash:
697a836b03239308249ff2dcaa2d63c902cfc4d6ec855cbb9cfdad73ccbcb91e
MD5 hash:
c3a5675dd7cf3b4129aefc91205f196a
SHA1 hash:
40737a09f09efaf964fd19abd6966a6c047abaeb
SH256 hash:
910210de1f1629ef9eb90af95fce0a0dbcdb9b255bcd0890ba5d08e55de932fb
MD5 hash:
d5bcac04f2a7a2e8f25650629164aca8
SHA1 hash:
2585a7f2b3908a27947f0966f5095720306a9d58
SH256 hash:
2932257d2d5f05ee3b7fd623e93423f52aada0a882385272bffdad9053fc335c
MD5 hash:
da5e8724e893356abacd0d01224cc01c
SHA1 hash:
a126f670c881905a028473a31639ec572defb0b8
SH256 hash:
33ac6b8012ce739e72022086b5d39b7fc030c20fa72988f76957685509d5c041
MD5 hash:
83f8ae95a7e6f016f6b00482588086e6
SHA1 hash:
70392939d6d60a913b51084ec1d98eaae8ca4868
SH256 hash:
a8792329efa0f7a7581ddd808a3053cb8928f4afa558b943a612aeaed35b1b7e
MD5 hash:
f02ff43fb3625f52b6cdd793b3f7f9fd
SHA1 hash:
1b5ccaab5557461c3bac1fa91c85e90a24dd1ce1
SH256 hash:
6c1501838458f714b06d002b112c3063da60ff901de13037cb71336c929ca077
MD5 hash:
705eda846d4266e396592ce6c0de0bf5
SHA1 hash:
ee803f755049ae9ddb1d17dedec22fd98bd406b2
SH256 hash:
aa217a4e5fefd9ee68af7ee896075b7020affcd2f2206156ae90608887530d15
MD5 hash:
afcf0fb9fbd80a6d2134195804db5d8e
SHA1 hash:
abf5b6dfc2e2612cd2f1af582792f6791937b6b7
SH256 hash:
06b795cf4007dfabb39adc54728d7bc4dabde17ff340ebac4e870856a1741fb7
MD5 hash:
315f5b3a3ecb3ad633df049fe5ad7514
SHA1 hash:
455849521e12028f82463c7d0985175a6eb4fb36
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments