MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16bbaa4003bd7b0ee00634113bd4da02b153f09817263dda98bb06d012c18d74. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 16 File information Comments

SHA256 hash: 16bbaa4003bd7b0ee00634113bd4da02b153f09817263dda98bb06d012c18d74
SHA3-384 hash: 2906e96482054bf2c9edbe4f676fdb2d88800ca686d6e64eccab387222d7b0794b6310b97f9526ba9b8e72d8007daaf5
SHA1 hash: b31d2916c200e2b1672ce2d0080a23d4e77e5092
MD5 hash: e0b3da406726f5b5636600fd5dad46e1
humanhash: mirror-white-helium-three
File name:atikmdag-patcher 1.4.8.exe
Download: download sample
Signature RedLineStealer
File size:3'414'984 bytes
First seen:2021-01-07 19:33:15 UTC
Last seen:2021-01-07 21:34:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 98304:/Eh9R10QS3YBDm9VnmLW55YfYo8C4EsgQ:uKQhm9N6bfR8ztn
Threatray 192 similar samples on MalwareBazaar
TLSH E5F5F13FB268653ED9AB0B3209B39250987B7B61A81B8C1E47F0091CCF665711F3FA55
Reporter o2genum
Tags:RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
222
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
atikmdag-patcher 1.4.8.exe
Verdict:
Suspicious activity
Analysis date:
2021-01-07 19:33:56 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Deleting a recently created file
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Creating a file
DNS request
Sending a custom TCP request
Creating a process with a hidden window
Running batch commands
Launching a process
Sending a UDP request
Launching cmd.exe command interpreter
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Enabling autorun by creating a file
Result
Threat name:
Quasar RedLine
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Deletes shadow drive data (may be related to ransomware)
Drops PE files with a suspicious file extension
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Obfuscated command line found
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Certutil Command
Submitted sample is a known malware sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected Quasar RAT
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 337141 Sample: atikmdag-patcher 1.4.8.exe Startdate: 07/01/2021 Architecture: WINDOWS Score: 100 122 ip-api.com 2->122 146 Malicious sample detected (through community Yara rule) 2->146 148 Yara detected RedLine Stealer 2->148 150 Yara detected Quasar RAT 2->150 152 10 other signatures 2->152 15 atikmdag-patcher 1.4.8.exe 2 2->15         started        18 rundll32.exe 2->18         started        signatures3 process4 file5 120 C:\Users\user\...\atikmdag-patcher 1.4.8.tmp, PE32 15->120 dropped 20 atikmdag-patcher 1.4.8.tmp 3 13 15->20         started        process6 file7 94 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 20->94 dropped 23 atikmdag-patcher 1.4.8.exe 2 20->23         started        process8 file9 102 C:\Users\user\...\atikmdag-patcher 1.4.8.tmp, PE32 23->102 dropped 26 atikmdag-patcher 1.4.8.tmp 5 19 23->26         started        process10 file11 104 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 26->104 dropped 106 C:\Program Files (x86)\...\is-VNP06.tmp, PE32 26->106 dropped 108 C:\Program Files (x86)\...\is-HEQBS.tmp, PE32 26->108 dropped 110 C:\Program Files (x86)\...\is-E7O02.tmp, PE32 26->110 dropped 29 halving.exe 18 26->29         started        33 atikmdag-patcher 1.4.8.exe 26->33         started        process12 dnsIp13 134 bitbucket.org 104.192.141.1, 443, 49746 AMAZON-02US United States 29->134 136 s3-1-w.amazonaws.com 52.217.99.212, 443, 49747 AMAZON-02US United States 29->136 138 bbuseruploads.s3.amazonaws.com 29->138 112 C:\Users\user\AppData\Local\...\redich05.exe, PE32 29->112 dropped 114 C:\Users\user\AppData\...\Client-built05.exe, PE32 29->114 dropped 116 C:\Users\user\AppData\...\redich05[1].exe, PE32 29->116 dropped 118 C:\Users\user\...\Client-built05[1].exe, PE32 29->118 dropped 35 Client-built05.exe 1 6 29->35         started        38 redich05.exe 1 6 29->38         started        file14 process15 signatures16 154 Machine Learning detection for dropped file 35->154 40 cmd.exe 1 35->40         started        42 cmd.exe 1 35->42         started        45 cmd.exe 1 38->45         started        47 cmd.exe 1 38->47         started        process17 signatures18 49 cmd.exe 2 40->49         started        52 conhost.exe 40->52         started        54 certutil.exe 2 40->54         started        158 Submitted sample is a known malware sample 42->158 56 conhost.exe 42->56         started        58 cmd.exe 2 45->58         started        60 conhost.exe 45->60         started        62 certutil.exe 2 45->62         started        64 conhost.exe 47->64         started        process19 signatures20 140 Obfuscated command line found 49->140 142 Uses ping.exe to sleep 49->142 66 csrss.com 49->66         started        69 PING.EXE 49->69         started        72 PING.EXE 49->72         started        80 4 other processes 49->80 74 msdtc.com 58->74         started        76 PING.EXE 58->76         started        78 tasklist.exe 58->78         started        83 4 other processes 58->83 process21 dnsIp22 144 Drops PE files with a suspicious file extension 66->144 85 csrss.com 66->85         started        124 127.0.0.1 unknown unknown 69->124 126 DKMlq.DKMlq 72->126 128 QeXciln.QeXciln 76->128 90 C:\Users\user\AppData\Local\...\csrss.com, Targa 80->90 dropped 92 C:\Users\user\AppData\Local\Temp\...\c, ASCII 80->92 dropped file23 signatures24 process25 dnsIp26 130 URxYlzffaMxWzhEaCIyia.URxYlzffaMxWzhEaCIyia 85->130 132 192.168.2.1 unknown unknown 85->132 96 C:\Users\user\AppData\...\TWLwDfGlRU.com, PE32 85->96 dropped 98 C:\Users\user\AppData\...\TWLwDfGlRU.url, MS 85->98 dropped 100 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 85->100 dropped 156 Injects a PE file into a foreign processes 85->156 file27 signatures28
Threat name:
Win32.Trojan.Witch
Status:
Malicious
First seen:
2021-01-07 19:34:06 UTC
AV detection:
9 of 29 (31.03%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:agenttesla family:redline discovery infostealer keylogger persistence spyware stealer trojan
Behaviour
Enumerates processes with tasklist
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
AgentTesla Payload
AgentTesla
RedLine
Unpacked files
SH256 hash:
16bbaa4003bd7b0ee00634113bd4da02b153f09817263dda98bb06d012c18d74
MD5 hash:
e0b3da406726f5b5636600fd5dad46e1
SHA1 hash:
b31d2916c200e2b1672ce2d0080a23d4e77e5092
SH256 hash:
a43522b8be197d4097bc7a04ac42e7bfb7e085e39969b58d0e4f2e7ff4cbc0f5
MD5 hash:
db27920346f23c1d742ec0722426417e
SHA1 hash:
adf18d452653e13ab5518706ea9c4c492a46f4f7
SH256 hash:
e6a59658f94281173a50760eb4ed827b61dba8033b33376635c474bf77d0d6b4
MD5 hash:
e8efdb289c86be774e8b5a87b62fc5fb
SHA1 hash:
23e33c5ccfe39d45748fbbb2ac6d0753a2fe2717
SH256 hash:
476ee34ee6778452d4a66295a6d5f425dff80130c3cd71c62225f9ed3f4b332b
MD5 hash:
b50f36ec53cdc8ec24cb7f4224de8d19
SHA1 hash:
6bcd00f674b0c0328fafc5c8c93b6625454bce20
SH256 hash:
670e7e985cd5eaef0d954133d24b1e80daff0681a3936e486087626217fd7918
MD5 hash:
7782c0085c90a3ea5257cc3942efa825
SHA1 hash:
9d9da247bdd01e9e298c708fb82bda18d9908e0b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:Chrome_stealer_bin_mem
Author:James_inthe_box
Description:Chrome in files like avemaria
Rule name:CN_disclosed_20180208_KeyLogger_1
Author:Florian Roth
Description:Detects malware from disclosed CN malware set
Reference:https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_GENRansomware
Author:ditekSHen
Description:detects command variations typically used by ransomware
Rule name:Keylog_bin_mem
Author:James_inthe_box
Description:Contains Keylog
Rule name:MALWARE_Win_QuasarRAT
Author:ditekSHen
Description:QuasarRAT payload
Rule name:MAL_QuasarRAT_May19_1
Author:Florian Roth
Description:Detects QuasarRAT malware
Reference:https://blog.ensilo.com/uncovering-new-activity-by-apt10
Rule name:MSILStealer
Author:https://github.com/hwvs
Description:Detects strings from C#/VB Stealers and QuasarRat
Reference:https://github.com/quasar/QuasarRAT
Rule name:Quasar
Author:JPCERT/CC Incident Response Group
Description:detect QuasarRAT in memory
Rule name:Quasar_RAT_1
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Quasar_RAT_2
Author:Florian Roth
Description:Detects Quasar RAT
Reference:https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Vermin_Keylogger_Jan18_1
Author:Florian Roth
Description:Detects Vermin Keylogger
Reference:https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/
Rule name:win_blackshades_w0
Author:Jean-Philippe Teissier / @Jipe_
Rule name:xRAT_1
Author:Florian Roth
Description:Detects Patchwork malware
Reference:https://goo.gl/Pg3P4W

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 16bbaa4003bd7b0ee00634113bd4da02b153f09817263dda98bb06d012c18d74

(this sample)

Comments