MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1bdfcfa2faaa7f70ad6b29dc77711dde848a9ffc5c63da8502ea2b1b9dc2aa06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 8 File information Comments

SHA256 hash: 1bdfcfa2faaa7f70ad6b29dc77711dde848a9ffc5c63da8502ea2b1b9dc2aa06
SHA3-384 hash: 9b7f7c7caf5be49e46b5fbf63d7004cbb1188d9577844c5ddb5f920ff48ef3d6e5ff9fb2a79da2b6f11655a7bcc45e69
SHA1 hash: c33ba192ae6bf50f356a6d4cae24e0a6427f2759
MD5 hash: b72f49b7e447030de5dbb59e5347aeda
humanhash: winner-winner-august-comet
File name:b72f49b7e447030de5dbb59e5347aeda.exe
Download: download sample
Signature RedLineStealer
File size:919'944 bytes
First seen:2021-12-18 17:07:14 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'657 x AgentTesla, 19'468 x Formbook, 12'206 x SnakeKeylogger)
ssdeep 12288:Ozq6lYN4ZOicHWTcovappm2QfKDb2qMt8CpP:kYOlIocoyBQfSa/
TLSH T1E915E1BF25C2B66DEF76077989FFB7004BB998D9432703C89354BAE0CAF81625B00595
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.147.196.146:6213

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.147.196.146:6213 https://threatfox.abuse.ch/ioc/277406/

Intelligence


File Origin
# of uploads :
1
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file
DNS request
Using the Windows Management Instrumentation requests
Сreating synchronization primitives
Sending an HTTP GET request
Sending a custom TCP request
Creating a file in the %AppData% directory
Creating a process from a recently created file
Creating a process with a hidden window
Running batch commands
Searching for the window
Creating a file in the %AppData% subdirectories
Creating a window
Launching a process
Query of malicious DNS domain
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated overlay packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Detected unpacking (overwrites its own PE header)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 542088 Sample: 1PRuAc9hUx.exe Startdate: 18/12/2021 Architecture: WINDOWS Score: 100 104 raw.githubusercontent.com 2->104 106 github.com 2->106 134 Antivirus detection for dropped file 2->134 136 Multi AV Scanner detection for dropped file 2->136 138 Multi AV Scanner detection for submitted file 2->138 140 5 other signatures 2->140 11 1PRuAc9hUx.exe 3 2->11         started        15 RegHost.exe 2->15         started        18 RegHost.exe 1 17 2->18         started        20 RegHost.exe 2->20         started        signatures3 process4 dnsIp5 92 C:\Users\user\AppData\...\1PRuAc9hUx.exe.log, ASCII 11->92 dropped 150 Writes to foreign memory regions 11->150 152 Injects a PE file into a foreign processes 11->152 22 RegAsm.exe 15 7 11->22         started        132 2 other IPs or domains 15->132 154 Allocates memory in foreign processes 15->154 156 Hides threads from debuggers 15->156 27 cmd.exe 15->27         started        39 3 other processes 15->39 120 140.82.121.3, 443, 49803, 49804 GITHUBUS United States 18->120 122 raw.githubusercontent.com 18->122 124 github.com 18->124 158 Detected unpacking (overwrites its own PE header) 18->158 160 Machine Learning detection for dropped file 18->160 29 cmd.exe 18->29         started        31 cmd.exe 18->31         started        41 2 other processes 18->41 126 185.199.108.133, 443, 49817, 49820 FASTLYUS Netherlands 20->126 128 raw.githubusercontent.com 20->128 130 github.com 20->130 33 cmd.exe 20->33         started        35 cmd.exe 20->35         started        37 conhost.exe 20->37         started        file6 signatures7 process8 dnsIp9 108 185.215.113.57, 49749, 50723 WHOLESALECONNECTIONSNL Portugal 22->108 110 cdn.discordapp.com 162.159.134.233, 443, 49769 CLOUDFLARENETUS United States 22->110 112 192.168.2.1 unknown unknown 22->112 90 C:\Users\user\AppData\Local\Temp\fl.exe, PE32+ 22->90 dropped 142 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 22->142 144 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 22->144 146 Tries to harvest and steal browser information (history, passwords, etc) 22->146 148 Tries to steal Crypto Currency Wallets 22->148 43 fl.exe 1 22 22->43         started        60 2 other processes 27->60 48 7z.exe 29->48         started        50 conhost.exe 29->50         started        52 conhost.exe 31->52         started        54 7z.exe 31->54         started        56 conhost.exe 33->56         started        58 7z.exe 33->58         started        62 2 other processes 35->62 file10 signatures11 process12 dnsIp13 116 github.com 140.82.121.4, 443, 49773, 49774 GITHUBUS United States 43->116 118 raw.githubusercontent.com 185.199.110.133, 443, 49779, 49783 FASTLYUS Netherlands 43->118 94 C:\Users\user\AppData\Roaming\...\RegHost.exe, PE32+ 43->94 dropped 96 C:\Users\user\AppData\Roaming\...\7z.exe, PE32+ 43->96 dropped 98 C:\Users\user\AppData\Roaming\...\7z.dll, PE32+ 43->98 dropped 102 2 other files (none is malicious) 43->102 dropped 162 Detected unpacking (overwrites its own PE header) 43->162 164 Machine Learning detection for dropped file 43->164 166 Hides threads from debuggers 43->166 64 cmd.exe 1 43->64         started        66 cmd.exe 1 43->66         started        68 cmd.exe 1 43->68         started        70 2 other processes 43->70 100 C:\Users\user\AppData\...\RegHost_Temp.exe, PE32+ 48->100 dropped file14 signatures15 process16 process17 72 conhost.exe 64->72         started        74 curl.exe 1 66->74         started        77 conhost.exe 66->77         started        79 conhost.exe 68->79         started        81 7z.exe 68->81         started        dnsIp18 83 7z.exe 72->83         started        86 conhost.exe 72->86         started        114 api.telegram.org 149.154.167.220, 443, 49772 TELEGRAMRU United Kingdom 74->114 process19 file20 88 C:\Users\user\AppData\...\RegData_Temp.exe, PE32+ 83->88 dropped
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-12-14 19:45:00 UTC
File Type:
PE (.Net Exe)
Extracted files:
3
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:cheat discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Modifies Windows Defender Real-time Protection settings
RedLine
Malware Config
C2 Extraction:
185.215.113.57:50723
45.147.196.146:6213
Unpacked files
SH256 hash:
15f8868da15b87fbecb7548f719789d48ca9525e58b080773ac95d9769c64c60
MD5 hash:
70ff10e35caf9d269c7d96892f3c3117
SHA1 hash:
289d87c3d2ba43223c5a1689fc84e1a8cb3650fd
SH256 hash:
1bdfcfa2faaa7f70ad6b29dc77711dde848a9ffc5c63da8502ea2b1b9dc2aa06
MD5 hash:
b72f49b7e447030de5dbb59e5347aeda
SHA1 hash:
c33ba192ae6bf50f356a6d4cae24e0a6427f2759
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender
Author:ditekSHen
Description:Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features
Rule name:INDICATOR_SUSPICIOUS_EXE_TelegramChatBot
Author:ditekSHen
Description:Detects executables using Telegram Chat Bot
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments