MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 10 File information Comments

SHA256 hash: 0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea
SHA3-384 hash: 08ce22328d9d6a3746c867974456a4527532c4abfe01896ca00bd8669e80f00411ce0da3d3c939d2bab638d4e9b8326b
SHA1 hash: 169cd19c1d29bebd2c7fe5a8de25b1429f8f2aed
MD5 hash: 4b0a935fbc037ea00bf17468d4cf5b85
humanhash: rugby-uncle-alaska-fix
File name:z52OURO08765.exe
Download: download sample
Signature RedLineStealer
File size:742'923 bytes
First seen:2024-04-01 15:52:00 UTC
Last seen:2024-04-01 16:26:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 890e522b31701e079a367b89393329e6 (25 x Formbook, 12 x AgentTesla, 8 x Loda)
ssdeep 12288:w6Wq4aaE6KwyF5L0Y2D1PqL5C38Lua13KVsrOQW60Ztsmhv3:GthEVaPqL58F2rBjmB3
Threatray 648 similar samples on MalwareBazaar
TLSH T181F48CC3F444348DF8DE827BBACA8E26E1C51D9A1D43190192713F51BFEE98297C1A6D
TrID 86.7% (.EXE) AutoIt3 compiled script executable (510622/80/67)
4.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
1.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
0.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon d4903292e2ccb4c0 (13 x Formbook, 8 x AgentTesla, 4 x NanoCore)
Reporter FXOLabs
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
4
# of downloads :
526
Origin country :
BR BR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea.exe
Verdict:
Suspicious activity
Analysis date:
2024-04-01 15:59:53 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Launching a process
Moving a file to the Program Files subdirectory
Replacing files
Sending an HTTP GET request
Forced system process termination
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
fingerprint keylogger lolbin overlay packed packed packed shell32 upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
PureLog Stealer, RedLine, Snake Keylogge
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Antivirus detection for dropped file
Antivirus detection for URL or domain
Drops VBS files to the startup folder
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Snake Keylogger
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1418232 Sample: z52OURO08765.exe Startdate: 01/04/2024 Architecture: WINDOWS Score: 100 30 checkip.dyndns.org 2->30 32 scratchdreams.tk 2->32 34 2 other IPs or domains 2->34 42 Multi AV Scanner detection for domain / URL 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 12 other signatures 2->48 8 z52OURO08765.exe 6 2->8         started        11 wscript.exe 1 2->11         started        signatures3 process4 file5 26 C:\Users\user\AppData\...\harrowment.exe, PE32 8->26 dropped 14 harrowment.exe 3 8->14         started        54 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->54 18 harrowment.exe 2 11->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\...\harrowment.vbs, data 14->28 dropped 56 Antivirus detection for dropped file 14->56 58 Drops VBS files to the startup folder 14->58 60 Writes to foreign memory regions 14->60 20 RegSvcs.exe 15 3 14->20         started        62 Maps a DLL or memory area into another process 18->62 23 RegSvcs.exe 2 18->23         started        signatures9 process10 dnsIp11 36 checkip.dyndns.com 132.226.8.169, 49716, 49717, 49720 UTMEMUS United States 20->36 38 scratchdreams.tk 172.67.169.18, 443, 49727 CLOUDFLARENETUS United States 23->38 40 reallyfreegeoip.org 172.67.177.134, 443, 49718, 49719 CLOUDFLARENETUS United States 23->40 50 Tries to steal Mail credentials (via file / registry access) 23->50 52 Tries to harvest and steal browser information (history, passwords, etc) 23->52 signatures12
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2024-03-28 18:40:45 UTC
File Type:
PE (Exe)
Extracted files:
54
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
upx
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Enumerates physical storage devices
AutoIT Executable
UPX packed file
Unpacked files
SH256 hash:
2396fa24841019f93715dcf9e0982998125b7fd9eb874df801f003271800a277
MD5 hash:
ef07e1e3e576c02ac47a2f0684f16d56
SHA1 hash:
73a52518a06aa590a295ac311e479c17ba6fd82f
Detections:
AutoIT_Compiled
SH256 hash:
121c04f671008060c14c05734269cb9e9e408fed02961728c27a87433b0f3dd8
MD5 hash:
e3ea97f86a691ebbb542c88cff0e582a
SHA1 hash:
c1227ee77a47d6c1a89abfab372978527a1d3016
Detections:
snake_keylogger win_404keylogger_g1 MAL_Envrial_Jan18_1 MALWARE_Win_SnakeKeylogger INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_DotNetProcHook INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
SH256 hash:
e3ac2a5f8f41aace2d24f287bf4174429ed25126f9632db1a4dd2c469ad13d6e
MD5 hash:
8f30b2dab302eb07237566af00608498
SHA1 hash:
21a7db428606acd3c6a232b28bda0d883eb898d2
Detections:
snake_keylogger win_404keylogger_g1 MAL_Envrial_Jan18_1 MALWARE_Win_SnakeKeylogger INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_DotNetProcHook RedLine_Campaign_June2021 INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients
SH256 hash:
4515f87b7eef5f31aed3be8a3e69524ee2daa09365767129e6d0c2592232bb93
MD5 hash:
85ba725c05a5fa04c4e23f2d0990510f
SHA1 hash:
5d01e7c38ee610b30c1d3e0fcedff94228e09b18
Detections:
MAL_Malware_Imphash_Mar23_1 MetaStealer_NET_Reactor_packer MALWARE_Win_RedLine
SH256 hash:
0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea
MD5 hash:
4b0a935fbc037ea00bf17468d4cf5b85
SHA1 hash:
169cd19c1d29bebd2c7fe5a8de25b1429f8f2aed
Detections:
MAL_Malware_Imphash_Mar23_1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIt
Author:Jean-Philippe Teissier / @Jipe_
Description:AutoIT packer
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RedLineStealer

Executable exe 0d9bd2ae2e4b023047b6c08684e9e5daae76e31cced4c3fdf4640136245f7eea

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::GetAce
MULTIMEDIA_APICan Play MultimediaWINMM.dll::timeGetTime
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments