MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a3b25e9d43dce5c47a29c74576ed3c5dde16c1de2004828d73f199d65fa315a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 0a3b25e9d43dce5c47a29c74576ed3c5dde16c1de2004828d73f199d65fa315a
SHA3-384 hash: 37a6b7ca2c739e8d364f27653c795cd4950fcc42a49fed269b3956ebba6acfcfde23e6a03237b11096a958a948e5b8af
SHA1 hash: 0d9146624ecedd65758b5913827bc70228cdb8bb
MD5 hash: 9da9cdb6584ff02b79fd72ca1bbb531c
humanhash: massachusetts-carpet-south-neptune
File name:WorldofIdols_beta 1.0.1.3.exe
Download: download sample
Signature RedLineStealer
File size:1'754'112 bytes
First seen:2022-12-05 14:55:48 UTC
Last seen:2022-12-05 16:35:10 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b20d33e9ab134fa35ef1de149efa68b3 (1 x RedLineStealer)
ssdeep 12288:1YhkpAMYvJDq2YdfUEjJ6D381+o0bUAiitC8Ba1WlsMXfoouM1yVtoitNuOA0yGQ:1Y+AxmROoQKv9XD
Threatray 90 similar samples on MalwareBazaar
TLSH T1B8852939BCD666A6F479883171A7F5F981EB3E90DA12BD874471E34A86018FF0427D23
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 6064a88987876468 (2 x RedLineStealer)
Reporter iamdeadlyz
Tags:exe RedLineStealer WorldOfIdols


Avatar
Iamdeadlyz
From worldofidols.com (impersonation of several projects - uses A.I. art)
Zip (f6cbac80a266f9e515de3b9799b6c2edcdc8276e63340f204ed092e04d7f8591) pw: WOI_beta
De-pump of: 371fa5c264fcca85c1928b15fac7b4901d61eb457030d63672219f9d171487f1
RedLineStealer C&C: 79.137.199.206:45354

Intelligence


File Origin
# of uploads :
2
# of downloads :
193
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
WorldofIdols_beta 1.0.1.3.exe
Verdict:
Malicious activity
Analysis date:
2022-12-05 15:20:35 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Creating a file
Unauthorized injection to a system process
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2022-12-05 14:56:13 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
16 of 26 (61.54%)
Threat level:
  2/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline infostealer spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
RedLine
RedLine payload
Unpacked files
SH256 hash:
0a3b25e9d43dce5c47a29c74576ed3c5dde16c1de2004828d73f199d65fa315a
MD5 hash:
9da9cdb6584ff02b79fd72ca1bbb531c
SHA1 hash:
0d9146624ecedd65758b5913827bc70228cdb8bb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AppLaunch
Author:iam-py-test
Description:Detect files referencing .Net AppLaunch.exe
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

f6cbac80a266f9e515de3b9799b6c2edcdc8276e63340f204ed092e04d7f8591

RedLineStealer

Executable exe 0a3b25e9d43dce5c47a29c74576ed3c5dde16c1de2004828d73f199d65fa315a

(this sample)

  
Dropped by
SHA256 f6cbac80a266f9e515de3b9799b6c2edcdc8276e63340f204ed092e04d7f8591
  
Dropped by
SHA256 371fa5c264fcca85c1928b15fac7b4901d61eb457030d63672219f9d171487f1
  
Delivery method
Distributed via web download

Comments