MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 085746b777ba0d65b21146cd88fbc603d510707cce87a6df58dc1fed213d209f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 7 File information Comments

SHA256 hash: 085746b777ba0d65b21146cd88fbc603d510707cce87a6df58dc1fed213d209f
SHA3-384 hash: 3a3b9603adfc965a956ffcd69fd8cd9e34091616110300ba4053af1ac24767e89f484198da7e3f67ceb6ce3dcbfae6bf
SHA1 hash: 8f61830518e6a8bf5fe7a374319cc3a1fd35105e
MD5 hash: e86177d75d2a5bd6494a35b08a74508a
humanhash: asparagus-north-wolfram-stream
File name:e86177d75d2a5bd6494a35b08a74508a.exe
Download: download sample
Signature RedLineStealer
File size:1'631'232 bytes
First seen:2023-10-25 21:40:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:kyHgC0ql8T4/Db4L+LaAAohMIpUhs5KdyRdz5Aa5GvU2Zz2jjyXw3jxiu9wcfJ7I:zpnEIaAriiKAqsx2ZqCXwXGcfd4G
Threatray 2'641 similar samples on MalwareBazaar
TLSH T1E275334667D88632D5FA137068FB121B18367CE78176922B235A785A0933BCBD43773B
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://31.192.237.75/

Intelligence


File Origin
# of uploads :
1
# of downloads :
350
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
e86177d75d2a5bd6494a35b08a74508a.exe
Verdict:
Malicious activity
Analysis date:
2023-10-25 21:53:20 UTC
Tags:
stealc stealer redline amadey botnet trojan sinkhole loader smoke opendir

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching a service
Sending a custom TCP request
Сreating synchronization primitives
Creating a file
Creating a window
Launching cmd.exe command interpreter
Running batch commands
Disabling the operating system update service
Forced shutdown of a system process
Blocking the Windows Defender launch
Unauthorized injection to a system process
Enabling autorun by creating a file
Gathering data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack anti-vm CAB control explorer installer lolbin packed rundll32 setupapi sfx shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Babadeda, Mystic Stealer, Raccoo
Detection:
malicious
Classification:
phis.troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies windows update settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Performs DNS queries to domains with low reputation
Phishing site detected (based on logo match)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected Babadeda
Yara detected Mystic Stealer
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Stealc
Yara detected Xmrig cryptocurrency miner
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1332238 Sample: EJW0r1crE2.exe Startdate: 25/10/2023 Architecture: WINDOWS Score: 100 170 raw.githubusercontent.com 2->170 172 amx435.xyz 2->172 174 17 other IPs or domains 2->174 192 Snort IDS alert for network traffic 2->192 194 Found malware configuration 2->194 196 Malicious sample detected (through community Yara rule) 2->196 198 24 other signatures 2->198 15 EJW0r1crE2.exe 1 4 2->15         started        18 svchost.exe 2->18         started        21 explothe.exe 2->21         started        signatures3 process4 dnsIp5 154 C:\Users\user\AppData\Local\...\cm5rR30.exe, PE32 15->154 dropped 156 C:\Users\user\AppData\Local\...\7QE5fM05.exe, PE32 15->156 dropped 23 cm5rR30.exe 1 4 15->23         started        176 127.0.0.1 unknown unknown 18->176 file6 process7 file8 142 C:\Users\user\AppData\Local\...\rL6WW65.exe, PE32 23->142 dropped 144 C:\Users\user\AppData\Local\...\6Ac3Gr9.exe, PE32 23->144 dropped 238 Antivirus detection for dropped file 23->238 240 Machine Learning detection for dropped file 23->240 27 rL6WW65.exe 1 4 23->27         started        signatures9 process10 file11 146 C:\Users\user\AppData\Local\...r4SX34.exe, PE32 27->146 dropped 148 C:\Users\user\AppData\Local\...\5Si4Vg5.exe, PE32 27->148 dropped 254 Antivirus detection for dropped file 27->254 256 Machine Learning detection for dropped file 27->256 31 Er4SX34.exe 1 4 27->31         started        35 5Si4Vg5.exe 27->35         started        signatures12 process13 file14 158 C:\Users\user\AppData\Local\...\bn4tG16.exe, PE32 31->158 dropped 160 C:\Users\user\AppData\Local\...\4iN349IA.exe, PE32 31->160 dropped 188 Antivirus detection for dropped file 31->188 190 Machine Learning detection for dropped file 31->190 37 bn4tG16.exe 1 4 31->37         started        40 4iN349IA.exe 31->40         started        162 C:\Users\user\AppData\Local\...\explothe.exe, PE32 35->162 dropped 43 explothe.exe 35->43         started        signatures15 process16 dnsIp17 134 C:\Users\user\AppData\Local\...\co4rT60.exe, PE32 37->134 dropped 136 C:\Users\user\AppData\Local\...\3hh98Dn.exe, PE32 37->136 dropped 46 3hh98Dn.exe 37->46         started        49 co4rT60.exe 1 4 37->49         started        242 Antivirus detection for dropped file 40->242 244 Writes to foreign memory regions 40->244 246 Allocates memory in foreign processes 40->246 248 Injects a PE file into a foreign processes 40->248 52 AppLaunch.exe 40->52         started        55 AppLaunch.exe 40->55         started        57 AppLaunch.exe 40->57         started        184 77.91.124.1 ECOTEL-ASRU Russian Federation 43->184 138 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 43->138 dropped 140 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 43->140 dropped 250 Creates an undocumented autostart registry key 43->250 252 Uses schtasks.exe or at.exe to add and modify task schedules 43->252 59 cmd.exe 43->59         started        61 schtasks.exe 43->61         started        63 rundll32.exe 43->63         started        file18 signatures19 process20 dnsIp21 258 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 46->258 260 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 46->260 262 Maps a DLL or memory area into another process 46->262 264 2 other signatures 46->264 65 explorer.exe 74 33 46->65 injected 114 C:\Users\user\AppData\Local\...\2ds5034.exe, PE32 49->114 dropped 116 C:\Users\user\AppData\Local\...\1Sq82Ix1.exe, PE32 49->116 dropped 70 1Sq82Ix1.exe 49->70         started        72 2ds5034.exe 49->72         started        178 77.91.124.86 ECOTEL-ASRU Russian Federation 52->178 74 cacls.exe 59->74         started        76 conhost.exe 59->76         started        78 cmd.exe 59->78         started        82 4 other processes 59->82 80 conhost.exe 61->80         started        file22 signatures23 process24 dnsIp25 164 5.42.65.80 RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU Russian Federation 65->164 166 amx435.xyz 193.31.28.64 QUICKPACKETUS United Kingdom 65->166 168 6 other IPs or domains 65->168 118 C:\Users\user\AppData\Local\Temp\DEF8.exe, PE32+ 65->118 dropped 120 C:\Users\user\AppData\Local\Temp\DA7.exe, PE32 65->120 dropped 122 C:\Users\user\AppData\Local\Temp\97AC.exe, PE32 65->122 dropped 124 10 other malicious files 65->124 dropped 200 System process connects to network (likely due to code injection or exploit) 65->200 202 Benign windows process drops PE files 65->202 84 40F.exe 65->84         started        88 DA7.exe 65->88         started        90 6DE.exe 65->90         started        97 4 other processes 65->97 204 Contains functionality to inject code into remote processes 70->204 206 Writes to foreign memory regions 70->206 208 Allocates memory in foreign processes 70->208 92 AppLaunch.exe 9 1 70->92         started        210 Injects a PE file into a foreign processes 72->210 94 AppLaunch.exe 12 72->94         started        212 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 74->212 214 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 74->214 file26 signatures27 process28 dnsIp29 130 C:\Users\user\AppData\Local\...\bM6FB1Kr.exe, PE32 84->130 dropped 132 C:\Users\user\AppData\Local\...\6az83np.exe, PE32 84->132 dropped 220 Antivirus detection for dropped file 84->220 222 Machine Learning detection for dropped file 84->222 99 bM6FB1Kr.exe 84->99         started        224 Multi AV Scanner detection for dropped file 88->224 226 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 88->226 228 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 88->228 230 Tries to harvest and steal browser information (history, passwords, etc) 88->230 232 Modifies windows update settings 92->232 234 Disable Windows Defender notifications (registry) 92->234 236 Disable Windows Defender real time protection (registry) 92->236 186 193.233.255.73 FREE-NET-ASFREEnetEU Russian Federation 94->186 103 chrome.exe 97->103         started        106 conhost.exe 97->106         started        108 chrome.exe 97->108         started        file30 signatures31 process32 dnsIp33 126 C:\Users\user\AppData\Local\...\BV6Yc0Gj.exe, PE32 99->126 dropped 128 C:\Users\user\AppData\Local\...\5Kl85Qo.exe, PE32 99->128 dropped 216 Antivirus detection for dropped file 99->216 218 Machine Learning detection for dropped file 99->218 110 BV6Yc0Gj.exe 99->110         started        180 192.168.2.5 unknown unknown 103->180 182 239.255.255.250 unknown Reserved 103->182 file34 signatures35 process36 file37 150 C:\Users\user\AppData\Local\...\kr1gf8oX.exe, PE32 110->150 dropped 152 C:\Users\user\AppData\Local\...\4sW059Ik.exe, PE32 110->152 dropped 266 Antivirus detection for dropped file 110->266 268 Machine Learning detection for dropped file 110->268 signatures38
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2023-10-25 21:41:06 UTC
File Type:
PE (Exe)
Extracted files:
226
AV detection:
20 of 23 (86.96%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:amadey family:dcrat family:glupteba family:redline family:smokeloader family:zgrat botnet:grome botnet:kinza botnet:up3 backdoor brand:google discovery dropper evasion infostealer loader persistence phishing rat spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks BIOS information in registry
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Drops file in Drivers directory
Modifies Windows Firewall
Possible attempt to disable PatchGuard
Stops running service(s)
Modifies boot configuration data using bcdedit
Amadey
DcRat
Detect ZGRat V1
Detected google phishing page
Glupteba
Glupteba payload
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SmokeLoader
Suspicious use of NtCreateUserProcessOtherParentProcess
ZGRat
Malware Config
C2 Extraction:
http://77.91.68.29/fks/
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
SH256 hash:
160ea596dea538000394fde4ba2d40fd2be5ab50037a77ba3000e927bff84ef1
MD5 hash:
22b50c95b39cbbdb00d5a4cd3d4886bd
SHA1 hash:
db8326c4fad0064ce3020226e8556e7cce8ce04e
SH256 hash:
869d227549dd8607b2f20ee2caa6061985be2a3f92ac6052f9924360e05ecd80
MD5 hash:
96f4e6671c516ca8fdaba16827104985
SHA1 hash:
dc13ba66d9880f0b2bfc90c0521333980821c2d5
SH256 hash:
564de00d9f0e170e7e55d1d4617c2e46f6394cfbf7e69ac8f359c29c024d4842
MD5 hash:
d188f358daa44fa176406ac7a6eccb3c
SHA1 hash:
e8d6df73a85d64688eaf6980788dc12ca27e9fcc
SH256 hash:
183cf4f3f9f8f24394d90efae17c1bfa830a3b0579bf4dea2be501b5ec1b7502
MD5 hash:
3e28cf065a1ea3c06a68d2b28e6cc596
SHA1 hash:
1a5edc1843b7518801221272a56ca53f7593a9b0
SH256 hash:
085746b777ba0d65b21146cd88fbc603d510707cce87a6df58dc1fed213d209f
MD5 hash:
e86177d75d2a5bd6494a35b08a74508a
SHA1 hash:
8f61830518e6a8bf5fe7a374319cc3a1fd35105e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:mal_healer
Author:Nikos 'n0t' Totosis
Description:Payload disabling Windows AV
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 085746b777ba0d65b21146cd88fbc603d510707cce87a6df58dc1fed213d209f

(this sample)

  
Delivery method
Distributed via web download

Comments