MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 16c3925debeb733f58c941bf756a6c247992dafa4dbfa8f7f1d5337b0f96fdf1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 6 File information Comments

SHA256 hash: 16c3925debeb733f58c941bf756a6c247992dafa4dbfa8f7f1d5337b0f96fdf1
SHA3-384 hash: 247363b8e7ca2ec0823a820a84283ea2750d91a5e14535982b52b71ea4137ad680ac52adb3da08c440ed4f1cc8cbe26b
SHA1 hash: 69e7ecc9043b076fa29b1769c3e918bc46d29086
MD5 hash: 5a806f938def17c7dc13130bc02255f7
humanhash: green-east-iowa-wolfram
File name:Loader_Hack.exe
Download: download sample
Signature RedLineStealer
File size:446'464 bytes
First seen:2021-09-22 16:52:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'665 x AgentTesla, 19'479 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 12288:VklT97iiOr9i5gjh7/SriDzrC78k1MthX5Rf8uOt3himAT7s3K4olg:Yojhea
Threatray 8 similar samples on MalwareBazaar
TLSH T13C94142864BFC01985E3EEA52DDCA8FBD99A55E3640C703701B4633B8B52B84DE4F479
Reporter Anonymous
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Loader_Hack.exe
Verdict:
Malicious activity
Analysis date:
2021-09-22 16:54:39 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Encrypted powershell cmdline option found
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Modifies the windows firewall
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Encoded PowerShell Command Line
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses netsh to modify the Windows network and firewall settings
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 488241 Sample: Loader_Hack.exe Startdate: 22/09/2021 Architecture: WINDOWS Score: 100 102 Multi AV Scanner detection for domain / URL 2->102 104 Antivirus / Scanner detection for submitted sample 2->104 106 Yara detected RedLine Stealer 2->106 108 7 other signatures 2->108 10 Loader_Hack.exe 2 2->10         started        14 System.exe 2->14         started        process3 dnsIp4 68 C:\Users\user\AppData\...\Loader_Hack.exe.log, ASCII 10->68 dropped 114 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->114 116 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 10->116 118 Injects a PE file into a foreign processes 10->118 17 Loader_Hack.exe 15 27 10->17         started        22 conhost.exe 10->22         started        90 iplogger.org 14->90 120 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->120 122 May check the online IP address of the machine 14->122 124 Machine Learning detection for dropped file 14->124 24 conhost.exe 14->24         started        file5 signatures6 process7 dnsIp8 78 5.188.119.156, 49744, 52352 SELECTELRU Russian Federation 17->78 80 km.popmonster.ru 81.177.141.36, 443, 49752, 49767 RTCOMM-ASRU Russian Federation 17->80 82 2 other IPs or domains 17->82 64 C:\Users\user\AppData\Local\...\769704679.exe, PE32+ 17->64 dropped 66 C:\Users\user\AppData\...\1056935770.exe, PE32+ 17->66 dropped 110 Tries to harvest and steal browser information (history, passwords, etc) 17->110 112 Tries to steal Crypto Currency Wallets 17->112 26 769704679.exe 40 17->26         started        31 1056935770.exe 3 17->31         started        file9 signatures10 process11 dnsIp12 84 iplogger.org 88.99.66.31, 443, 49780, 49781 HETZNER-ASDE Germany 26->84 86 bitbucket.org 104.192.141.1, 443, 49782, 49786 AMAZON-02US United States 26->86 88 4 other IPs or domains 26->88 70 C:\ProgramData\UpSys.exe, PE32+ 26->70 dropped 72 C:\ProgramData\Systemd\SecurityHealth.exe, PE32+ 26->72 dropped 74 C:\ProgramData\MicrosoftNetwork\System.exe, PE32+ 26->74 dropped 76 2 other files (none is malicious) 26->76 dropped 126 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 26->126 128 May check the online IP address of the machine 26->128 130 Machine Learning detection for dropped file 26->130 136 2 other signatures 26->136 33 SecurityHealth.exe 26->33         started        36 powershell.exe 26->36         started        38 cmd.exe 26->38         started        42 5 other processes 26->42 132 Multi AV Scanner detection for dropped file 31->132 134 Encrypted powershell cmdline option found 31->134 40 powershell.exe 31->40         started        file13 signatures14 process15 signatures16 92 Query firmware table information (likely to detect VMs) 33->92 94 Tries to detect sandboxes and other dynamic analysis tools (window names) 33->94 96 Hides threads from debuggers 33->96 98 Tries to detect sandboxes / dynamic malware analysis system (registry check) 33->98 44 UpSys.exe 36->44         started        46 conhost.exe 36->46         started        48 netsh.exe 36->48         started        50 conhost.exe 38->50         started        52 taskkill.exe 38->52         started        100 Uses netsh to modify the Windows network and firewall settings 40->100 54 conhost.exe 40->54         started        56 conhost.exe 42->56         started        58 taskkill.exe 42->58         started        60 3 other processes 42->60 process17 process18 62 UpSys.exe 44->62         started       
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-09-22 16:53:08 UTC
AV detection:
23 of 45 (51.11%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@masyana_lzt discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
5.188.119.156:52352
Unpacked files
SH256 hash:
e5437f028264ff429222e6d0cf299b690da106c9f8da4c7b59575ecbbd524ea2
MD5 hash:
618ffddb642df9e0f4522e9d508b0c3e
SHA1 hash:
2df95a8e985bfe32cf42a03dcd5a22462228d267
SH256 hash:
16c3925debeb733f58c941bf756a6c247992dafa4dbfa8f7f1d5337b0f96fdf1
MD5 hash:
5a806f938def17c7dc13130bc02255f7
SHA1 hash:
69e7ecc9043b076fa29b1769c3e918bc46d29086
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments