MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a17e2ca8f223de67c0864fac1d24c7bb2d0c796c46e9ce04e4dff374c577ea1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs 2 YARA 10 File information Comments

SHA256 hash: 0a17e2ca8f223de67c0864fac1d24c7bb2d0c796c46e9ce04e4dff374c577ea1
SHA3-384 hash: dbe749b5093f687076a6585310d25a5e01de930ab6b3833d6bef65c33361d8027e1b003318e08b2fb7854efbacaae015
SHA1 hash: d3406bf8d0e9ac246c272fa284a35a3560bdbff5
MD5 hash: 1bbc3bff13812c25d47cd84bca3da2dc
humanhash: fifteen-solar-uncle-avocado
File name:1bbc3bff13812c25d47cd84bca3da2dc.exe
Download: download sample
Signature RedLineStealer
File size:307'712 bytes
First seen:2024-12-13 00:35:12 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f48301e47b2e40bf9641ab1156532a80 (3 x RedLineStealer)
ssdeep 6144:O2JKCwoXjMvjfTK/zNTdEpZ4m1qpxXQKQrUJ0tYRVAOTIdTsImm:8CwoXjMbTKLNhEpZ4m0vXQKQrxgu
Threatray 1 similar samples on MalwareBazaar
TLSH T17B644B27308162CFF798B273D01499B4D4FEE8B552B64AA5A120F6F7171B2C34F14EA6
TrID 38.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
15.6% (.ICL) Windows Icons Library (generic) (2059/9)
15.4% (.EXE) OS/2 Executable (generic) (2029/13)
15.2% (.EXE) Generic Win/DOS Executable (2002/3)
15.2% (.EXE) DOS Executable Generic (2000/1)
Magika pebin
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://185.81.68.147/7vhfjke3/index.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://185.81.68.147/7vhfjke3/index.php https://threatfox.abuse.ch/ioc/1356396/
http://185.81.68.148/8Fvu5jh4DbS/index.php https://threatfox.abuse.ch/ioc/1356397/

Intelligence


File Origin
# of uploads :
1
# of downloads :
522
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
1bbc3bff13812c25d47cd84bca3da2dc.exe
Verdict:
Malicious activity
Analysis date:
2024-12-13 00:37:05 UTC
Tags:
payload loader stealer metastealer redline amadey botnet python crypto-regex rdp

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %AppData% subdirectories
Enabling the 'hidden' option for recently created files
Launching a process
Сreating synchronization primitives
Connection attempt
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a window
Searching for synchronization primitives
Creating a process with a hidden window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching the process to change network settings
Setting browser functions hooks
Possible injection to a system process
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Stealing user critical data
Unauthorized injection to a system process
Enabling a "Do not show hidden files" option
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-debug anti-vm explorer hacktool lolbin microsoft_visual_cc msiexec obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Contains functionality to start a terminal service
Creates a thread in another existing process (thread injection)
Found API chain indicative of debugger detection
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Capture Wi-Fi password
Sigma detected: Suspicious Script Execution From Temp Folder
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Uses netsh to modify the Windows network and firewall settings
Writes to foreign memory regions
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1574171 Sample: yINR7uQlPr.exe Startdate: 13/12/2024 Architecture: WINDOWS Score: 100 171 Multi AV Scanner detection for domain / URL 2->171 173 Suricata IDS alerts for network traffic 2->173 175 Found malware configuration 2->175 177 16 other signatures 2->177 9 yINR7uQlPr.exe 1 3 2->9         started        13 Gxtuum.exe 2->13         started        process3 dnsIp4 109 C:\Users\user\...\1DC30FADAFF92643095942.exe, PE32+ 9->109 dropped 111 1DC30FADAFF9264309...exe:Zone.Identifier, ASCII 9->111 dropped 207 Found evasive API chain (may stop execution after checking mutex) 9->207 209 Found API chain indicative of debugger detection 9->209 211 Contains functionality to inject threads in other processes 9->211 215 8 other signatures 9->215 16 svchost.exe 1 9->16         started        19 audiodg.exe 1 9->19         started        21 msiexec.exe 1 9->21         started        121 185.81.68.148, 49752, 49761, 49773 KLNOPT-ASFI Finland 13->121 113 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 13->113 dropped 115 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 13->115 dropped 117 C:\Users\user\AppData\Local\Temp\...\ssg.exe, PE32 13->117 dropped 119 7 other malicious files 13->119 dropped 213 Contains functionality to start a terminal service 13->213 23 update.exe 13->23         started        25 update.exe 13->25         started        27 rundll32.exe 13->27         started        29 4 other processes 13->29 file5 signatures6 process7 signatures8 125 Found evasive API chain (may stop execution after checking mutex) 16->125 127 Found API chain indicative of debugger detection 16->127 129 Contains functionality to inject threads in other processes 16->129 143 3 other signatures 16->143 31 explorer.exe 81 18 16->31 injected 131 Changes the view of files in windows explorer (hidden files and folders) 19->131 133 Multi AV Scanner detection for dropped file 23->133 145 4 other signatures 23->145 36 msiexec.exe 23->36         started        38 svchost.exe 23->38         started        40 audiodg.exe 23->40         started        135 Machine Learning detection for dropped file 25->135 147 2 other signatures 25->147 42 svchost.exe 25->42         started        44 audiodg.exe 25->44         started        46 msiexec.exe 25->46         started        48 rundll32.exe 27->48         started        137 System process connects to network (likely due to code injection or exploit) 29->137 139 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 29->139 141 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 29->141 149 2 other signatures 29->149 50 rundll32.exe 29->50         started        process9 dnsIp10 123 185.81.68.147, 1912, 49704, 49705 KLNOPT-ASFI Finland 31->123 89 C:\Users\user\AppData\...C2F.tmp.gfx.exe, PE32 31->89 dropped 91 C:\Users\user\AppData\...24B.tmp.update.exe, PE32+ 31->91 dropped 93 C:\Users\user\AppData\...\D7AB.tmp.ssg.exe, PE32 31->93 dropped 95 C:\Users\user\AppData\...\CC11.tmp.ctx.exe, PE32+ 31->95 dropped 151 Benign windows process drops PE files 31->151 153 Contains functionality to start a terminal service 31->153 155 Found many strings related to Crypto-Wallets (likely being stolen) 31->155 157 Contains functionality to inject threads in other processes 31->157 52 CC11.tmp.ctx.exe 52 31->52         started        56 1DC30FADAFF92643095942.exe 3 31->56         started        58 1DC30FADAFF92643095942.exe 3 31->58         started        68 2 other processes 31->68 159 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 36->159 161 Tries to steal Instant Messenger accounts or passwords 48->161 163 Tries to harvest and steal ftp login credentials 48->163 165 Tries to harvest and steal browser information (history, passwords, etc) 48->165 60 powershell.exe 48->60         started        62 netsh.exe 48->62         started        167 Uses netsh to modify the Windows network and firewall settings 50->167 169 Tries to harvest and steal WLAN passwords 50->169 64 powershell.exe 50->64         started        66 netsh.exe 50->66         started        file11 signatures12 process13 file14 97 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 52->97 dropped 99 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 52->99 dropped 101 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 52->101 dropped 107 47 other files (7 malicious) 52->107 dropped 181 Multi AV Scanner detection for dropped file 52->181 183 Machine Learning detection for dropped file 52->183 70 CC11.tmp.ctx.exe 52->70         started        185 Found evasive API chain (may stop execution after checking mutex) 56->185 187 Found API chain indicative of debugger detection 56->187 189 Contains functionality to inject threads in other processes 56->189 203 2 other signatures 56->203 72 svchost.exe 56->72         started        85 2 other processes 56->85 205 4 other signatures 58->205 87 3 other processes 58->87 103 C:\Users\user\...\246122658369_Desktop.zip, Zip 60->103 dropped 191 Found many strings related to Crypto-Wallets (likely being stolen) 60->191 193 Loading BitLocker PowerShell Module 60->193 74 conhost.exe 60->74         started        76 conhost.exe 62->76         started        78 conhost.exe 64->78         started        80 conhost.exe 66->80         started        105 C:\Users\user\AppData\Local\...behaviorgraphxtuum.exe, PE32 68->105 dropped 195 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 68->195 197 Contains functionality to start a terminal service 68->197 199 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 68->199 201 Tries to steal Crypto Currency Wallets 68->201 82 Gxtuum.exe 68->82         started        signatures15 process16 signatures17 179 Contains functionality to start a terminal service 82->179
Threat name:
Win64.Trojan.Midie
Status:
Malicious
First seen:
2024-12-11 11:46:55 UTC
File Type:
PE+ (Exe)
Extracted files:
2
AV detection:
18 of 24 (75.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:0f3be6 botnet:eewx credential_access discovery execution infostealer persistence privilege_escalation pyinstaller spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: PowerShell
Detects Pyinstaller
Enumerates physical storage devices
Event Triggered Execution: Netsh Helper DLL
System Location Discovery: System Language Discovery
System Network Configuration Discovery: Wi-Fi Discovery
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads local data of messenger clients
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Blocklisted process makes network request
Downloads MZ/PE file
Amadey
Amadey family
RedLine
RedLine payload
Redline family
Malware Config
C2 Extraction:
185.81.68.147:1912
http://185.81.68.147
http://185.81.68.148
Verdict:
Malicious
Tags:
Win.Trojan.Ulise-10037990-0
YARA:
n/a
Unpacked files
SH256 hash:
ed0da0e51c62f4a299e46017b3affa616495a89a5a8ddd365a81788f039bcd76
MD5 hash:
1ef4bf43cef27aa6dbc6b6c275878836
SHA1 hash:
47f5cb439ee5f78fe55865cf7228eae0e5041a91
Detections:
INDICATOR_SUSPICIOUS_ReflectiveLoader ReflectiveLoader
SH256 hash:
0a17e2ca8f223de67c0864fac1d24c7bb2d0c796c46e9ce04e4dff374c577ea1
MD5 hash:
1bbc3bff13812c25d47cd84bca3da2dc
SHA1 hash:
d3406bf8d0e9ac246c272fa284a35a3560bdbff5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:INDICATOR_SUSPICIOUS_References_SecTools
Author:ditekSHen
Description:Detects executables referencing many IR and analysis tools
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious single byte XORed keyword 'Mozilla/5.0' - it uses yara's XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.
Reference:https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force()
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 0a17e2ca8f223de67c0864fac1d24c7bb2d0c796c46e9ce04e4dff374c577ea1

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.dll::LoadLibraryA

Comments