MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 149cfe6af20dd3b333e87fe3b9d764ca9c62d2ab3846845f2a210b8c3695eeba. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 149cfe6af20dd3b333e87fe3b9d764ca9c62d2ab3846845f2a210b8c3695eeba
SHA3-384 hash: 55ab049a71a2064676d2c7d8a27e94a10289c97294fc8ae0c0531dd28be2fb46adaec82d2a84d4c5ee37c5f9873c996e
SHA1 hash: e4b79889cfbc590d416feaf5d67c894479ba3e26
MD5 hash: dbb5076bc4604f29fce02c87ce8eec2d
humanhash: march-may-carpet-lithium
File name:dbb5076bc4604f29fce02c87ce8eec2d.exe
Download: download sample
Signature RedLineStealer
File size:148'792 bytes
First seen:2021-04-20 11:50:08 UTC
Last seen:2021-04-20 13:01:44 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 04b14c74d128b600565b7582f06e9a4f (2 x RedLineStealer)
ssdeep 768:/Ia7FoXriv7zCWbTOJxgbidM/9s0vb1LAiz9GcSfdvBfJpQ2bZ+8tYosjKAvpXSE:/L7FoXriv7zHF9tbx6WquSOIm
Threatray 250 similar samples on MalwareBazaar
TLSH 4AE328E3FAD8944AF4E76DF5A655B2B14D308D3020C1D82A87482E52EA317CBC4F567B
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dbb5076bc4604f29fce02c87ce8eec2d.exe
Verdict:
Malicious activity
Analysis date:
2021-04-20 12:11:59 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending an HTTP GET request
Creating a file
Launching a process
Creating a process with a hidden window
Creating a file in the %temp% directory
Deleting a recently created file
Sending a UDP request
Sending an HTTP POST request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Gathering data
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:qwer discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
135.181.170.169:50845
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments