MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1bdaf6e7454d17ae8d8d39f8c2e3e8efddab6713e6759ca166887a6e183a8d88. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments 1

SHA256 hash: 1bdaf6e7454d17ae8d8d39f8c2e3e8efddab6713e6759ca166887a6e183a8d88
SHA3-384 hash: 7e78a3df5f9e5043355a78b0c2f24bc0c8cdf2c24a8fe59831db3c60d77eeccc2f0ea607a46b1ad6fc04461f879645b1
SHA1 hash: fcb136131501b29ad3ed6a734ff825ee7117abb1
MD5 hash: 3dece15d546bb5e47917f7bcb4ee43fd
humanhash: idaho-uniform-paris-texas
File name:3dece15d546bb5e47917f7bcb4ee43fd
Download: download sample
Signature RedLineStealer
File size:1'081'856 bytes
First seen:2022-06-29 16:06:16 UTC
Last seen:2022-06-29 17:04:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 064ab38fd632ba15d0a669e416a8b83f (2 x RedLineStealer)
ssdeep 6144:BGQwgEZdoOk2P/GcfnjtXFVXyeya5ZkALBZbo7JNPODrmLkBPY3OvxHd4vF1k8Si:U9CEKQu1tSlR
Threatray 1 similar samples on MalwareBazaar
TLSH T1913540002ECD1F2FFB97DBA1943A520492A29D513B39E833DD452B6FF8D7B94C196098
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
oNSnXpPoGNxWT8ONYsRJ44ea.exe
Verdict:
Suspicious activity
Analysis date:
2022-06-30 11:37:33 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
Sending a custom TCP request
DNS request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Launching a process
Using the Windows Management Instrumentation requests
Reading critical registry keys
Sending an HTTP GET request
Changing a file
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 654595 Sample: qB2L7Pb3B3 Startdate: 29/06/2022 Architecture: WINDOWS Score: 48 15 Multi AV Scanner detection for submitted file 2->15 6 qB2L7Pb3B3.exe 2 2->6         started        process3 file4 13 C:\Users\user\AppData\...\qB2L7Pb3B3.exe.log, ASCII 6->13 dropped 9 conhost.exe 6->9         started        11 qB2L7Pb3B3.exe 6->11         started        process5
Threat name:
ByteCode-MSIL.Trojan.Pwsx
Status:
Malicious
First seen:
2022-06-29 15:07:19 UTC
File Type:
PE (.Net Exe)
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:privatos discovery infostealer spyware stealer
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
RedLine
Malware Config
C2 Extraction:
185.215.113.75:81
Unpacked files
SH256 hash:
e2124866f72825b0fcf633f63f2139b64530d1bdc8b51f7c551d528165b6ad32
MD5 hash:
9cddd36de1c4e71cc58801b09d7696d6
SHA1 hash:
6b8c18bc234ad86b0288af490c7d06281f1bcaa0
SH256 hash:
1bdaf6e7454d17ae8d8d39f8c2e3e8efddab6713e6759ca166887a6e183a8d88
MD5 hash:
3dece15d546bb5e47917f7bcb4ee43fd
SHA1 hash:
fcb136131501b29ad3ed6a734ff825ee7117abb1
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 1bdaf6e7454d17ae8d8d39f8c2e3e8efddab6713e6759ca166887a6e183a8d88

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-06-29 16:06:23 UTC

url : hxxps://iranparsa-novin.com/TrdngAnr6339.exe