MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0f3c7a6cb84441e196b92d391b44f892b269593ebc326a9718d8e94d4d24987d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 7 File information Comments

SHA256 hash: 0f3c7a6cb84441e196b92d391b44f892b269593ebc326a9718d8e94d4d24987d
SHA3-384 hash: 1d63338abfa4f017b4bdcdc625026138b77ef9a5f275c99747d6eecb8245e74de01a78ab531185e6c24cc4a85077bf30
SHA1 hash: 15998df69cfe6a73cc7bee80033762fc3fa2d0a4
MD5 hash: de9825118349fa416efcf340a55dfda7
humanhash: lima-autumn-south-uranus
File name:de9825118349fa416efcf340a55dfda7.exe
Download: download sample
Signature RedLineStealer
File size:326'825 bytes
First seen:2023-06-14 05:00:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5b43169544844188711b217df61eb2d5 (11 x RedLineStealer)
ssdeep 6144:XlYALt9/jXSbAqY704pnH7hYx7oPG5RU0nCL:XZ9jXSbAqYTVYxPRU0
Threatray 954 similar samples on MalwareBazaar
TLSH T1E9646DC0991CD231E2838472E87B4263960CE8767A54D7EF2F86A53CBA766D1CD54EC3
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
83.97.73.130:19061

Intelligence


File Origin
# of uploads :
1
# of downloads :
263
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
de9825118349fa416efcf340a55dfda7.exe
Verdict:
Malicious activity
Analysis date:
2023-06-14 05:02:26 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Sending a TCP request to an infection source
Stealing user critical data
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-06-14 05:01:07 UTC
File Type:
PE (Exe)
AV detection:
23 of 24 (95.83%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:rovno discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
Malware Config
C2 Extraction:
83.97.73.130:19061
Unpacked files
SH256 hash:
d3317e8736aa8dbab715ed4825a1b374910913434b8e905858d63d2a54c35820
MD5 hash:
ab642789406f11bf1c6dd5f209bb0c3b
SHA1 hash:
bfc2e9013e0674222055dc3b8a88f8cf208c92ae
Detections:
redline
Parent samples :
977427fac0a6ab4edca95b6d68314e0b89dc38c441e7e6af0ecea1bcde8bba79
a010fc0117e94f049dff4bc2c9bb8a9ffe83b1c76544eac187006ae3caa5fac0
5524ca02c5f2cc4add6ef62eda26ce11c2d3ef5560f472a274d3c3a2f2c68e86
9e462cd16656cd7f2ef0a93f7b5c7a23a27603d7923595718ab25382cc2fbaf3
de9eacbf9662d69c9ac2c2a6152f023d57801bc272f83bdaece3caaf36210be2
0949ad6bf2c4b3bf494f88d16973650573daa32580f34981b44ef461ad08aac0
3414e421b9fe7ab68dcb492c20cb6a67a8d061711acd3baff0bcd3a24eb8a276
6684f491928b560f256ac470dfd05414b2ea43b08fd294fee9e524ba7fc2127e
d1f02c87243715c31c2483ba90d7ce9d8cb5135ac3b0212d142f804c950fa39d
f6060b14ee7f8e74bb75e9710f5eda57a86fd391af8c6575ae83b2ffb9cfd290
6db69d1dbd4dbe1108a05955d03052864c7acf3165d0ddbfad7e4156c37a0bd8
0871bd3afd1a0b5cc15b3dae103e3519235ebc9f9beb229bcd7f8103f65cdb91
cffcc7c49af3baf33816b69314f7b42d1504ac97835e4024836866a56dbacb82
0f3c7a6cb84441e196b92d391b44f892b269593ebc326a9718d8e94d4d24987d
408b193a8fcadc5e16a9d81012fcab5b79d63cd26423db4e24c8f128d086ae77
c785dd4c2c71d7438ecc628c0544a3d89c5aa5a258d8cf7107e57d3b717920f5
155627897cbfe455dd97dc2b8cf2367c5803f2b0fc4cb40ae609f62ff53ce299
f82900f13974d768f6716c1c72bc3e9c9dadac253094c4d83b476d1bb3806abd
7e377f9e9a8c3ef5745ac7a94dd0cefef7bbe6339441b80b141746fc332c691e
1fc014209b6ea611c6b38bd3f77802ef1dcd9f43e61e98ac66f8d356f10dd176
90c0d92b87b1c826256e581b53e55a370af4ce5fbf4533162303cfad5f4c8d37
558df7f274fd168e6db46ae7f686b6a0a1e6b6220627db79051a1948ec1d84a9
d9aa69161f9b781e377776b06693794d1c74fb9c5d0e126f37556275b1821802
d08d1d327dd5038d9add88ad817f073b024a206d0204c84a213e8fd9a7ee3aa2
28b72070d6af0ef8d0bca993ab7a9997f95dad4b4b0963869d6962383f0647c0
b9892a1271e9383be0202403c7c09e6712fc51c28f69385678dd13a2aea823d8
5eabf21874d47792f7fd601e87fd8f98f1e9a98370e6fa3e85acda0e0ed5b5fb
80a5552633e679459396c1c07bfe3841fb17c55cbfd1fb836da974977d38beb9
273f6c085b96913230891c6bb1259f3efccf0345fbe737ec78b68ad27abc0ab3
eaaea60d9b4608bace5567c5a075dd95db16599aa625847eb8d499bc7fe0f47c
43ea91a89f9de60902984248369f7a3d4fb32bd7d9c6e31695041fd608ff2622
396c7efdb10954bc477823d7989b0dea1566fad3ed070de8088f729560856d22
b6d938fc1184448513a173888740c48a77a04b368cb79b720bf83e9b21e9b242
3465cd8736d114a18428e219451a6d7b5ece4e43e094b697d3b4bbacb63fe03d
26a110e78e7fcfc4728425557d16d66b990ce31254c0f0b581e3d90fafd05609
1b8f09ce5298d85ed40914389df71cd7d7981df34220d9b5eaf9b1dc1c7e2e0b
fa286d8efa2e1b891145de22222e6812e23aebfe6dbf5441798c9dcacc4f18f0
59c67ade4ac8da3ab9d24e5a96899b197f3245071eb2b4506d40f816b5db7057
385a86f6367cfd1e2b27d4440f0eb3085f3f9a13ba5e068afc92c754b54c1185
99f5727a8695624ad522b7f4b9a2b624437e8459dda3e55f06540cdebc95720e
adc89e4db0fa86bb70583350e2b730b8cd621cb7e5b1821cbb6dfd764340040f
716abee0d15979a235778b18f24afde63fc3f02c4243e24ce2e07b99c3c90706
e4d8c967b7d18bf50068527cec39ec2f3788b1ca0dc5720f7d3f3cf3836cbb15
2556dd7adc577241ad81854101c67d97e75e2c203a4db76ed49b1db3e7a23930
497ee0244fcd1e0701229f46cc570ae2260497bb0ba0471089344a8016aee0cb
7eec0cecf20acc0ae5c19f0a4f26599f30a930f57ec684499070f76fe9d8a151
59dc8cd3e2cc85b1ea6c2986ad21e6ea74bdebc35fe6bddeb3eee64d69f628a3
5939848fe5c91cfded4ac9b9d99b2a20d164ca45f1cb527e64d0571c98af48d4
c21f93092496c6d0b8bc09fa3a2005242bf0b46dd82383acd4ff1b9be546aceb
29b7725be3b7300dda4b8c3e6c55e55ade1129e87767ae8eec03fbb5fd863858
SH256 hash:
7b701357fa3346508f7d4633b22db9216eac980aed923da72e3d54d3ad5c1369
MD5 hash:
4b8e73ac31addc3699a6db8c7d074e32
SHA1 hash:
6dd14cad1ce448c822760d14ff54d1097f32bbbb
SH256 hash:
0f3c7a6cb84441e196b92d391b44f892b269593ebc326a9718d8e94d4d24987d
MD5 hash:
de9825118349fa416efcf340a55dfda7
SHA1 hash:
15998df69cfe6a73cc7bee80033762fc3fa2d0a4
Malware family:
RedLine.E
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 0f3c7a6cb84441e196b92d391b44f892b269593ebc326a9718d8e94d4d24987d

(this sample)

  
Delivery method
Distributed via web download

Comments