MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d8247c4ed6a49e33ac5d481f08cdef22d2ed7caf2434d031e0a0cebe296893d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 0d8247c4ed6a49e33ac5d481f08cdef22d2ed7caf2434d031e0a0cebe296893d
SHA3-384 hash: e0c26fd10ec9cd21ede5e6765e6907da884983ad34d60a042be7a501f56cab1b00be4c849de8b77dac941cedbf756d1a
SHA1 hash: 681eff87d31fa28c9456a76f35719cf96f2c276d
MD5 hash: 38e3ee2402f504d7b662f83d6898e33d
humanhash: carolina-wyoming-triple-diet
File name:SOA Sinotech Logistics May'2023.exe
Download: download sample
Signature RedLineStealer
File size:730'112 bytes
First seen:2023-06-16 01:40:16 UTC
Last seen:2023-06-18 12:44:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:pNPwZa2iNx5LbzIu9+r90pHJNqukj4defl17qVmnnY7fLb5FIevjrGU2k4:3Qa1j5LA9GH/qHj4I1WKY736UJ
Threatray 2'804 similar samples on MalwareBazaar
TLSH T1DAF4020466D88B2AC47F0BF995001231837A6327F537D7170DC3B5EA6A92BD2915BB8B
TrID 63.0% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
11.2% (.SCR) Windows screen saver (13097/50/3)
9.0% (.EXE) Win64 Executable (generic) (10523/12/4)
5.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
3.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
65.108.24.105:2017

Intelligence


File Origin
# of uploads :
2
# of downloads :
484
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
SOA Sinotech Logistics May'2023.exe
Verdict:
Malicious activity
Analysis date:
2023-06-16 01:40:35 UTC
Tags:
rat redline trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Creating a process from a recently created file
Searching for the window
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a process with a hidden window
Creating a file in the %temp% directory
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
floxif packed threat virus
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine, zgRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Scheduled temp file as task from temp location
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected RedLine Stealer
Yara detected zgRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 888759 Sample: SOA_Sinotech_Logistics_May'... Startdate: 16/06/2023 Architecture: WINDOWS Score: 100 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 Sigma detected: Scheduled temp file as task from temp location 2->55 57 7 other signatures 2->57 7 SOA_Sinotech_Logistics_May'2023.exe 7 2->7         started        11 PNjyfY.exe 5 2->11         started        process3 file4 37 C:\Users\user\AppData\Roaming\PNjyfY.exe, PE32 7->37 dropped 39 C:\Users\user\...\PNjyfY.exe:Zone.Identifier, ASCII 7->39 dropped 41 C:\Users\user\AppData\Local\...\tmp8711.tmp, XML 7->41 dropped 43 SOA_Sinotech_Logistics_May'2023.exe.log, ASCII 7->43 dropped 59 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 7->59 61 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 7->61 63 Uses schtasks.exe or at.exe to add and modify task schedules 7->63 65 Adds a directory exclusion to Windows Defender 7->65 13 SOA_Sinotech_Logistics_May'2023.exe 15 29 7->13         started        17 powershell.exe 21 7->17         started        19 schtasks.exe 1 7->19         started        67 Multi AV Scanner detection for dropped file 11->67 69 Injects a PE file into a foreign processes 11->69 21 PNjyfY.exe 11->21         started        23 schtasks.exe 11->23         started        25 PNjyfY.exe 11->25         started        signatures5 process6 dnsIp7 45 65.108.24.105, 2017, 49700, 49702 ALABANZA-BALTUS United States 13->45 47 api.ip.sb 13->47 27 conhost.exe 13->27         started        29 conhost.exe 17->29         started        31 conhost.exe 19->31         started        49 api.ip.sb 21->49 71 Tries to harvest and steal browser information (history, passwords, etc) 21->71 73 Tries to steal Crypto Currency Wallets 21->73 33 conhost.exe 21->33         started        35 conhost.exe 23->35         started        signatures8 process9
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2023-06-16 01:32:45 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
14 of 24 (58.33%)
Threat level:
  2/5
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:redline family:sectoprat botnet:cheat discovery infostealer rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Reads user/profile data of web browsers
RedLine
RedLine payload
SectopRAT
SectopRAT payload
Malware Config
C2 Extraction:
65.108.24.105:2017
Unpacked files
SH256 hash:
52f358d201e81d3a0391cedd3042e2f957555b77aa49559f7fb810bbb7673ba1
MD5 hash:
c785ddc46141af772c75101d17c46a41
SHA1 hash:
e248723b6f60cc7607980d07172b64c33b2b2f15
SH256 hash:
b228ecf9befd294ac93c9cb40ef92fe6e3bb7777b27282765922c2583049e705
MD5 hash:
ce61cb5fc522d394e5582f7d38f8d6c2
SHA1 hash:
a52bb32394f4e07782d11408a9e4012e18be1e65
SH256 hash:
25e4e2e2eec96389cd705cb10acd037939a9789c893a121998ca40fa444a8fbf
MD5 hash:
30e2c7128c68f442f4abafbb81286f81
SHA1 hash:
6784bc8902aa45561110b3717f047248193209c2
SH256 hash:
2ba35a990f0fc16793730b4766658d5f79df5e682ac13b040bfee0aff588c7e8
MD5 hash:
ca3287f64351f5ba3c1d01b1112a3710
SHA1 hash:
5498288419c9d6ae5e232a70a06218ac7196629b
SH256 hash:
b86193f0f5eeadf451f23596dffb4d015245311c67bc15244c2b1c81293d3679
MD5 hash:
be09d1a9fbdc7fe4ad47e49a0ccf2a0e
SHA1 hash:
3eea7d856de59fefd670110c2edda63c319a5a1b
SH256 hash:
0d8247c4ed6a49e33ac5d481f08cdef22d2ed7caf2434d031e0a0cebe296893d
MD5 hash:
38e3ee2402f504d7b662f83d6898e33d
SHA1 hash:
681eff87d31fa28c9456a76f35719cf96f2c276d
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments