MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07de0324fd15b8dab3b0c9e4345a2ecc0d2bc0c806f6702cda99e480e9d6506c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 5 File information Comments

SHA256 hash: 07de0324fd15b8dab3b0c9e4345a2ecc0d2bc0c806f6702cda99e480e9d6506c
SHA3-384 hash: 93f3616766e6d49c07c11d45c99dcd1a47d14e4cc5056b050d6c724731cfc05dda5af198116ed52c90937627de2fcae3
SHA1 hash: e769f41e2b36b7326b692c27fa8555d55e3fdcb4
MD5 hash: 2bc87a9ad768070676676654252ebdae
humanhash: lactose-ohio-mango-ceiling
File name:Fortnite Hack Mod v1.4.exe
Download: download sample
Signature RedLineStealer
File size:6'243'980 bytes
First seen:2021-12-05 14:49:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ced282d9b261d1462772017fe2f6972b (127 x Formbook, 113 x GuLoader, 70 x RemcosRAT)
ssdeep 98304:6ax5Ip3dfp0isEy6QULX7WIxLYjDTPsAci55ufOJq8NlslJCvmiH1SZr7eU+ATFO:6axMpsE2w7PlYjDxciSmJq8Nls7e8r7Q
TLSH T17356128DEF3875BFE288E4F97C5661900D4E2C1D036C61AE275CBB9A027051171BBE6E
File icon (PE):PE icon
dhash icon 71ccaaf4c48ecc71 (1 x RedLineStealer)
Reporter tech_skeech
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
258
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Fortnite Hack Mod v1.4.exe
Verdict:
No threats detected
Analysis date:
2021-12-05 14:51:36 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for synchronization primitives
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
DNS request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Running batch commands
Launching a process
Unauthorized injection to a recently created process
Query of malicious DNS domain
Stealing user critical data
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Phoenix Miner RedLine
Detection:
malicious
Classification:
troj.spyw.expl.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Exploit detected, runtime environment dropped PE file
Exploit detected, runtime environment starts unknown processes
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
May check the online IP address of the machine
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Phoenix Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 534190 Sample: Fortnite Hack Mod v1.4.exe Startdate: 05/12/2021 Architecture: WINDOWS Score: 100 117 raw.githubusercontent.com 2->117 119 github.com 2->119 165 Antivirus detection for dropped file 2->165 167 Multi AV Scanner detection for submitted file 2->167 169 Yara detected Phoenix Miner 2->169 171 6 other signatures 2->171 12 Fortnite Hack Mod v1.4.exe 11 2->12         started        15 RegHost.exe 2->15         started        19 RegHost.exe 2->19         started        signatures3 process4 dnsIp5 111 C:\Users\user\AppData\Local\Temp\javaw.exe, PE32 12->111 dropped 113 C:\Users\user\AppData\Local\Temp\java.exe, PE32 12->113 dropped 115 C:\Users\user\AppData\...\Congesting.exe, PE32+ 12->115 dropped 21 java.exe 15 7 12->21         started        26 Congesting.exe 25 5 12->26         started        28 javaw.exe 15 12->28         started        143 raw.githubusercontent.com 15->143 145 github.com 15->145 153 Writes to foreign memory regions 15->153 155 Allocates memory in foreign processes 15->155 157 Modifies the context of a thread in another process (thread injection) 15->157 159 Injects a PE file into a foreign processes 15->159 30 bfsvc.exe 15->30         started        32 cmd.exe 15->32         started        34 cmd.exe 15->34         started        40 2 other processes 15->40 147 140.82.121.3, 443, 49772, 49773 GITHUBUS United States 19->147 149 raw.githubusercontent.com 19->149 151 github.com 19->151 161 Machine Learning detection for dropped file 19->161 36 cmd.exe 19->36         started        38 conhost.exe 19->38         started        file6 signatures7 process8 dnsIp9 121 103.246.144.29, 44301, 49752 EMAXXTELECOMCOLTD-AS-APEmaxxTelecomCoLtdKH Cambodia 21->121 123 cdn.discordapp.com 162.159.130.233, 443, 49756 CLOUDFLARENETUS United States 21->123 125 192.168.2.1 unknown unknown 21->125 101 C:\Users\user\AppData\Local\Temp\build.exe, PE32+ 21->101 dropped 173 Multi AV Scanner detection for dropped file 21->173 175 Detected unpacking (changes PE section rights) 21->175 177 Detected unpacking (overwrites its own PE header) 21->177 191 7 other signatures 21->191 42 build.exe 21->42         started        127 api.telegram.org 149.154.167.220, 443, 49785 TELEGRAMRU United Kingdom 26->127 129 www.google.com 142.250.181.228, 49755, 80 GOOGLEUS United States 26->129 131 icanhazip.com 104.18.115.97, 443, 49782 CLOUDFLARENETUS United States 26->131 179 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 26->179 181 May check the online IP address of the machine 26->181 183 Writes to foreign memory regions 26->183 193 3 other signatures 26->193 47 MSBuild.exe 26->47         started        133 ccf9ba3695b15b4f0787e6290e0f63allcomejroo839jxi13.xyz 207.244.237.176, 49751, 80 CONTABOUS United States 28->133 185 Performs DNS queries to domains with low reputation 28->185 187 Machine Learning detection for dropped file 28->187 49 conhost.exe 28->49         started        189 Hides threads from debuggers 30->189 51 conhost.exe 30->51         started        53 conhost.exe 32->53         started        55 7z.exe 32->55         started        61 2 other processes 34->61 57 conhost.exe 36->57         started        59 7z.exe 36->59         started        file10 signatures11 process12 dnsIp13 135 github.com 140.82.121.4, 443, 49757, 49758 GITHUBUS United States 42->135 137 raw.githubusercontent.com 185.199.108.133, 443, 49759, 49762 FASTLYUS Netherlands 42->137 103 C:\Users\user\AppData\Roaming\...\RegHost.exe, PE32+ 42->103 dropped 105 C:\Users\user\AppData\Roaming\...\7z.exe, PE32+ 42->105 dropped 107 C:\Users\user\AppData\Roaming\...\7z.dll, PE32+ 42->107 dropped 109 2 other files (none is malicious) 42->109 dropped 199 Multi AV Scanner detection for dropped file 42->199 201 Machine Learning detection for dropped file 42->201 203 Injects code into the Windows Explorer (explorer.exe) 42->203 205 5 other signatures 42->205 63 explorer.exe 42->63         started        65 bfsvc.exe 42->65         started        68 cmd.exe 42->68         started        72 2 other processes 42->72 70 WerFault.exe 47->70         started        file14 signatures15 process16 signatures17 74 RegHost.exe 63->74         started        163 Hides threads from debuggers 65->163 78 conhost.exe 65->78         started        80 7z.exe 68->80         started        83 conhost.exe 68->83         started        85 7z.exe 72->85         started        87 conhost.exe 72->87         started        process18 dnsIp19 139 raw.githubusercontent.com 74->139 141 github.com 74->141 195 Modifies the context of a thread in another process (thread injection) 74->195 197 Injects a PE file into a foreign processes 74->197 89 cmd.exe 74->89         started        91 conhost.exe 74->91         started        97 C:\Users\user\AppData\...\RegHost_Temp.exe, PE32+ 80->97 dropped 99 C:\Users\user\AppData\...\RegData_Temp.exe, PE32+ 85->99 dropped file20 signatures21 process22 process23 93 conhost.exe 89->93         started        95 7z.exe 89->95         started       
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-12-04 14:48:08 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
29 of 45 (64.44%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery evasion infostealer persistence spyware stealer trojan upx
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
Unpacked files
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
6c031894d0f8ac19c59c08b6537e6916bdcee59e5b50db749e9788690745ce36
MD5 hash:
c298251461c2eb28e7c857ac474b0d39
SHA1 hash:
da0ea947c4e239270f762b2f5c125a8b29b48f02
SH256 hash:
07de0324fd15b8dab3b0c9e4345a2ecc0d2bc0c806f6702cda99e480e9d6506c
MD5 hash:
2bc87a9ad768070676676654252ebdae
SHA1 hash:
e769f41e2b36b7326b692c27fa8555d55e3fdcb4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:Ins_NSIS_Buer_Nov_2020_1
Author:Arkbird_SOLG
Description:Detect NSIS installer used for Buer loader
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 07de0324fd15b8dab3b0c9e4345a2ecc0d2bc0c806f6702cda99e480e9d6506c

(this sample)

  
Delivery method
Distributed via web download

Comments