MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0a9ff0b46182a441c0f9c021722817984ec884266c123d2fd6257f9c70d322ab. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments 1

SHA256 hash: 0a9ff0b46182a441c0f9c021722817984ec884266c123d2fd6257f9c70d322ab
SHA3-384 hash: 48a9e79b46649bddee72d25beaa20833f29330fe10fe284a6b1c501d280f506a5837399b9aacf43b41cc7f1d2d75e62b
SHA1 hash: 63e628501bd54422ebfc6857039d50fd97cbe55d
MD5 hash: 97e8e525e2fc27c2634da7d235f5ff5c
humanhash: sweet-august-fix-edward
File name:97e8e525e2fc27c2634da7d235f5ff5c
Download: download sample
Signature RedLineStealer
File size:404'992 bytes
First seen:2021-07-25 22:19:39 UTC
Last seen:2021-07-25 22:52:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f072aaf7476b5a5a056c892b505526e0 (2 x RedLineStealer, 1 x CryptBot)
ssdeep 12288:DcyFrVdwvwFGB3yVywS1B0a7OkeOMSBM:LVdwvwFi1eMeOMiM
Threatray 1'243 similar samples on MalwareBazaar
TLSH T16F84BF20BAA1C430F5F211F845B993B9A93D7EB09B3451CB62E43EEE16346E1AC31757
dhash icon ead8a89cc6e68ea0 (25 x RaccoonStealer, 8 x DanaBot, 8 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
174
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
97e8e525e2fc27c2634da7d235f5ff5c
Verdict:
Malicious activity
Analysis date:
2021-07-25 22:23:13 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a file
Connection attempt to an infection source
Stealing user critical data
Sending an HTTP POST request to an infection source
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Gathering data
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-07-25 21:38:49 UTC
AV detection:
20 of 46 (43.48%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:26.07 discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.15:61506
Unpacked files
SH256 hash:
2874225109e9c49b40f948eb341e850ac8368524f4b1743171e4365114e8dff1
MD5 hash:
c624a09677e63c0465dddd15a8e8e617
SHA1 hash:
7b774d32b49a02d04d94fcbc289d645c7e803d7e
SH256 hash:
76d18287023515773565e61bcfdea5f3c8236f0ee13270e126984cdb7aa9e9ec
MD5 hash:
e56a6776504bf2511a37c9ba69350aa2
SHA1 hash:
3ec2c6822a23c2cc3dca4541f11c6a40c47381d9
SH256 hash:
763413a79820c8648c9c34648d4c90b2ffa46c688bbf5ddb8520fc9394a5d26c
MD5 hash:
4ad73e90d61a40e949d44b82688d0ce0
SHA1 hash:
01e3d0b84eb33f52aeb363332e0da53e3a4105cb
SH256 hash:
0a9ff0b46182a441c0f9c021722817984ec884266c123d2fd6257f9c70d322ab
MD5 hash:
97e8e525e2fc27c2634da7d235f5ff5c
SHA1 hash:
63e628501bd54422ebfc6857039d50fd97cbe55d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 0a9ff0b46182a441c0f9c021722817984ec884266c123d2fd6257f9c70d322ab

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-07-25 22:19:40 UTC

url : hxxp://dahgarq.top/jolion/lipster.exe