MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 139c83b8cf3674d992e04f9e4a047c3a7ad5279b2f6b8bf18c39603f82bca16d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 4 File information Comments

SHA256 hash: 139c83b8cf3674d992e04f9e4a047c3a7ad5279b2f6b8bf18c39603f82bca16d
SHA3-384 hash: 0697c1ffb7e2a6d69a8bad8ce7ae85693fb96cd587e1550b513273f9393096b68622e22c6d649306cf1567c8b1eddd1d
SHA1 hash: 807f363607e6808b1cb7504de1ef9718343bd2cc
MD5 hash: 95e82a0b2a99370162fa203994cc8b0e
humanhash: timing-papa-crazy-blue
File name:Injector.exe
Download: download sample
Signature RedLineStealer
File size:4'790'784 bytes
First seen:2021-10-22 17:36:05 UTC
Last seen:2021-10-22 19:18:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 908bea7ee71339f1c35ba419da3ba679 (36 x RedLineStealer, 2 x RaccoonStealer)
ssdeep 98304:wLIgXzEGmyPe4pTQAXf8bTAbqKRf4fRDpvX4:sdpT5XpeEf4fRl
Threatray 266 similar samples on MalwareBazaar
TLSH T16F26122721610151E4E58C36C83BFEF571F61A764F82ACFF16D96DC62B325E0B222A53
Reporter JaffaCakes118
Tags:exe RedLineStealer

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
138.124.186.121:45760 https://threatfox.abuse.ch/ioc/226883/

Intelligence


File Origin
# of uploads :
2
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Injector.exe
Verdict:
Suspicious activity
Analysis date:
2021-10-22 17:36:54 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Changes security center settings (notifications, updates, antivirus, firewall)
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Powershell Defender Exclusion
Sigma detected: Xmrig
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 507961 Sample: Injector.exe Startdate: 22/10/2021 Architecture: WINDOWS Score: 100 141 Sigma detected: Xmrig 2->141 143 Malicious sample detected (through community Yara rule) 2->143 145 Multi AV Scanner detection for submitted file 2->145 147 7 other signatures 2->147 14 Injector.exe 2->14         started        17 services64.exe 2->17         started        19 dsfsdf.exe 2->19         started        21 9 other processes 2->21 process3 dnsIp4 193 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->193 195 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 14->195 197 Writes to foreign memory regions 14->197 207 2 other signatures 14->207 24 AppLaunch.exe 15 7 14->24         started        29 WerFault.exe 23 9 14->29         started        199 Multi AV Scanner detection for dropped file 17->199 201 Allocates memory in foreign processes 17->201 203 Creates a thread in another existing process (thread injection) 17->203 31 conhost.exe 17->31         started        33 conhost.exe 19->33         started        125 192.168.2.1 unknown unknown 21->125 205 Changes security center settings (notifications, updates, antivirus, firewall) 21->205 35 MpCmdRun.exe 21->35         started        37 WerFault.exe 21->37         started        signatures5 process6 dnsIp7 127 138.124.186.121, 45760, 49746 NOKIA-ASFI Norway 24->127 129 cdn.discordapp.com 162.159.130.233, 443, 49752 CLOUDFLARENETUS United States 24->129 119 C:\Users\user\AppData\Local\Temp\fl.exe, PE32 24->119 dropped 183 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->183 185 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 24->185 187 Tries to harvest and steal browser information (history, passwords, etc) 24->187 189 Tries to steal Crypto Currency Wallets 24->189 39 fl.exe 2 24->39         started        121 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 29->121 dropped 123 C:\Windows\System32\Microsoft\Libs\WR64.sys, PE32+ 31->123 dropped 191 Sample is not signed and drops a device driver 31->191 43 conhost.exe 35->43         started        file8 signatures9 process10 file11 115 C:\Users\user\AppData\Local\Temp\turbo.exe, PE32+ 39->115 dropped 117 C:\Users\user\AppData\...\monero-cash.exe, PE32+ 39->117 dropped 165 Antivirus detection for dropped file 39->165 167 Multi AV Scanner detection for dropped file 39->167 169 Adds a directory exclusion to Windows Defender 39->169 45 cmd.exe 39->45         started        47 cmd.exe 39->47         started        49 cmd.exe 1 39->49         started        signatures12 process13 signatures14 52 monero-cash.exe 45->52         started        55 conhost.exe 45->55         started        57 turbo.exe 47->57         started        59 conhost.exe 47->59         started        131 Adds a directory exclusion to Windows Defender 49->131 61 powershell.exe 23 49->61         started        63 conhost.exe 49->63         started        65 powershell.exe 49->65         started        process15 signatures16 157 Multi AV Scanner detection for dropped file 52->157 159 Writes to foreign memory regions 52->159 161 Allocates memory in foreign processes 52->161 67 conhost.exe 52->67         started        163 Creates a thread in another existing process (thread injection) 57->163 70 conhost.exe 57->70         started        process17 file18 111 C:\Windows\System32\services64.exe, PE32+ 67->111 dropped 72 cmd.exe 67->72         started        75 cmd.exe 67->75         started        113 C:\Windows\System32\dsfsdf.exe, PE32+ 70->113 dropped 77 cmd.exe 70->77         started        79 cmd.exe 70->79         started        process19 signatures20 171 Drops executables to the windows directory (C:\Windows) and starts them 72->171 81 services64.exe 72->81         started        84 conhost.exe 72->84         started        173 Uses schtasks.exe or at.exe to add and modify task schedules 75->173 86 conhost.exe 75->86         started        88 schtasks.exe 75->88         started        90 dsfsdf.exe 77->90         started        92 conhost.exe 77->92         started        94 conhost.exe 79->94         started        96 schtasks.exe 79->96         started        process21 signatures22 133 Writes to foreign memory regions 81->133 135 Allocates memory in foreign processes 81->135 137 Creates a thread in another existing process (thread injection) 81->137 98 conhost.exe 81->98         started        139 Multi AV Scanner detection for dropped file 90->139 102 conhost.exe 90->102         started        process23 file24 107 C:\Windows\System32\...\sihost64.exe, PE32+ 98->107 dropped 149 Drops executables to the windows directory (C:\Windows) and starts them 98->149 151 Writes to foreign memory regions 98->151 153 Modifies the context of a thread in another process (thread injection) 98->153 155 Injects a PE file into a foreign processes 98->155 109 C:\Windows\System32\...\sihost32.exe, PE32+ 102->109 dropped 104 sihost32.exe 102->104         started        signatures25 process26 signatures27 175 Multi AV Scanner detection for dropped file 104->175 177 Writes to foreign memory regions 104->177 179 Allocates memory in foreign processes 104->179 181 Creates a thread in another existing process (thread injection) 104->181
Threat name:
ByteCode-MSIL.Infostealer.Reline
Status:
Malicious
First seen:
2021-10-22 17:37:04 UTC
AV detection:
13 of 38 (34.21%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@l_like_a_sir_l infostealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
138.124.186.121:45760
Unpacked files
SH256 hash:
11aa6abc65d0d1ee596bd93ed0769f43fea45b8138e45af0e80d9e25ba436c81
MD5 hash:
c4fb93ea3b1c39acbdd36d9c782160e6
SHA1 hash:
765520f94e324c9088186d4c40d5deb8db906f54
SH256 hash:
139c83b8cf3674d992e04f9e4a047c3a7ad5279b2f6b8bf18c39603f82bca16d
MD5 hash:
95e82a0b2a99370162fa203994cc8b0e
SHA1 hash:
807f363607e6808b1cb7504de1ef9718343bd2cc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 139c83b8cf3674d992e04f9e4a047c3a7ad5279b2f6b8bf18c39603f82bca16d

(this sample)

  
Delivery method
Distributed via web download

Comments