MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1bf8638a91190e3d6107b1943fb70168db47f5ce320ca582217989bfd052d1ea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA File information Comments

SHA256 hash: 1bf8638a91190e3d6107b1943fb70168db47f5ce320ca582217989bfd052d1ea
SHA3-384 hash: c3d2c6c97269b81047e23a843a27cd80882ec7bc8b9ec6a5d76751a3b4e8e195f9e80132396ae37bed1ce9fb65551bba
SHA1 hash: c2a7b34cd8373147f958b14a4318c71169ba5818
MD5 hash: 654461a0317681e5c0a066da1efc34e3
humanhash: pluto-ohio-sad-sweet
File name:654461a0317681e5c0a066da1efc34e3.exe
Download: download sample
Signature RedLineStealer
File size:1'398'784 bytes
First seen:2023-04-30 09:35:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1efe015ade03f54dd6d9b2ccea28b970 (268 x RedLineStealer, 256 x Amadey, 2 x GuLoader)
ssdeep 24576:cymytCFyttVF9OM2WtXc/WHtdbJUKfRFNRib0fn:LD1jZts/A9JUoRPRf
Threatray 418 similar samples on MalwareBazaar
TLSH T1A5552343F6CCA473D8B2133041F902DB0D32BDF06B646AAB2659A68D9D736857A34773
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
62.108.37.115:3030

Intelligence


File Origin
# of uploads :
1
# of downloads :
542
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
654461a0317681e5c0a066da1efc34e3.exe
Verdict:
Malicious activity
Analysis date:
2023-04-30 09:38:18 UTC
Tags:
trojan amadey rat redline loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Creating a file
Launching a service
Launching the default Windows debugger (dwwin.exe)
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack.dll anti-vm CAB confuserex installer packed packed rundll32.exe setupapi.dll shell32.dll spygate stealer
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Changes security center settings (notifications, updates, antivirus, firewall)
Creates an undocumented autostart registry key
Creates HTML files with .exe extension (expired dropper behavior)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Disables UAC (registry)
Drops PE files with benign system names
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sample uses string decryption to hide its real strings
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 856620 Sample: nMIdIHOO7E.exe Startdate: 30/04/2023 Architecture: WINDOWS Score: 100 159 Snort IDS alert for network traffic 2->159 161 Multi AV Scanner detection for domain / URL 2->161 163 Found malware configuration 2->163 165 20 other signatures 2->165 14 nMIdIHOO7E.exe 1 4 2->14         started        17 svchost.exe 2->17         started        20 svchost.exe 2->20         started        22 13 other processes 2->22 process3 dnsIp4 127 C:\Users\user\AppData\Local\...\za879380.exe, PE32 14->127 dropped 129 C:\Users\user\AppData\Local\...\ys923113.exe, PE32 14->129 dropped 25 za879380.exe 1 4 14->25         started        131 C:\Windows\Temp\krnp3dnj.inf, Windows 17->131 dropped 147 Writes to foreign memory regions 17->147 149 Adds a directory exclusion to Windows Defender 17->149 151 Injects a PE file into a foreign processes 17->151 29 powershell.exe 17->29         started        31 cmstp.exe 17->31         started        153 Multi AV Scanner detection for dropped file 20->153 155 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->155 145 192.168.2.1 unknown unknown 22->145 133 C:\Windows\Temp\wrtmwdxx.inf, Windows 22->133 dropped 157 Changes security center settings (notifications, updates, antivirus, firewall) 22->157 33 MpCmdRun.exe 22->33         started        35 cmstp.exe 22->35         started        file5 signatures6 process7 file8 115 C:\Users\user\AppData\Local\...\za305224.exe, PE32 25->115 dropped 117 C:\Users\user\AppData\Local\...\xBUYv19.exe, PE32 25->117 dropped 193 Antivirus detection for dropped file 25->193 195 Multi AV Scanner detection for dropped file 25->195 197 Machine Learning detection for dropped file 25->197 37 za305224.exe 1 4 25->37         started        41 conhost.exe 29->41         started        43 conhost.exe 33->43         started        signatures9 process10 file11 111 C:\Users\user\AppData\Local\...\za528805.exe, PE32 37->111 dropped 113 C:\Users\user\AppData\Local\...\w41AB81.exe, PE32 37->113 dropped 187 Antivirus detection for dropped file 37->187 189 Multi AV Scanner detection for dropped file 37->189 191 Machine Learning detection for dropped file 37->191 45 w41AB81.exe 3 37->45         started        49 za528805.exe 1 4 37->49         started        signatures12 process13 file14 121 C:\Users\user\AppData\Local\...\oneetx.exe, PE32 45->121 dropped 217 Antivirus detection for dropped file 45->217 219 Multi AV Scanner detection for dropped file 45->219 221 Machine Learning detection for dropped file 45->221 51 oneetx.exe 45->51         started        123 C:\Users\user\AppData\Local\...\u80481995.exe, PE32 49->123 dropped 125 C:\Users\user\AppData\Local\...\28746274.exe, PE32 49->125 dropped 56 28746274.exe 3 49->56         started        58 u80481995.exe 1 1 49->58         started        signatures15 process16 dnsIp17 139 212.113.119.255, 49684, 49685, 49687 ASRELCOMSPBRU Russian Federation 51->139 141 cdn-141.anonfiles.com 195.96.151.34, 443, 49690 UTA-ASAT unknown 51->141 143 3 other IPs or domains 51->143 101 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 51->101 dropped 103 C:\Users\user\AppData\...\wyCdPrh7QF.exe, PE32+ 51->103 dropped 105 C:\Users\user\AppData\Local\...\payload.exe, PE32 51->105 dropped 109 2 other malicious files 51->109 dropped 173 Antivirus detection for dropped file 51->173 175 Multi AV Scanner detection for dropped file 51->175 177 Creates an undocumented autostart registry key 51->177 185 2 other signatures 51->185 60 wyCdPrh7QF.exe 51->60         started        64 payload.exe 51->64         started        67 schtasks.exe 51->67         started        69 rundll32.exe 51->69         started        107 C:\Windows\Temp\1.exe, PE32 56->107 dropped 179 Machine Learning detection for dropped file 56->179 71 1.exe 9 1 56->71         started        181 Detected unpacking (changes PE section rights) 58->181 183 Detected unpacking (overwrites its own PE header) 58->183 file18 signatures19 process20 dnsIp21 119 C:\Users\user\AppData\Roaming\svchost.exe, PE32+ 60->119 dropped 199 Multi AV Scanner detection for dropped file 60->199 201 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 60->201 203 Drops PE files with benign system names 60->203 73 cmd.exe 60->73         started        75 cmd.exe 60->75         started        135 api.ip.sb 64->135 137 onlinemailing.link 62.108.37.115, 3030, 49745, 49828 COMTRANCE-ASDE Germany 64->137 205 Antivirus detection for dropped file 64->205 207 Machine Learning detection for dropped file 64->207 209 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 64->209 215 2 other signatures 64->215 77 conhost.exe 64->77         started        79 conhost.exe 67->79         started        211 Disable Windows Defender notifications (registry) 71->211 213 Disable Windows Defender real time protection (registry) 71->213 file22 signatures23 process24 process25 81 svchost.exe 73->81         started        85 conhost.exe 73->85         started        87 timeout.exe 73->87         started        89 conhost.exe 75->89         started        91 schtasks.exe 75->91         started        file26 99 C:\Users\user\AppData\Local\Temp\?????.sys, PE32+ 81->99 dropped 167 Adds a directory exclusion to Windows Defender 81->167 169 Disables UAC (registry) 81->169 171 Sample is not signed and drops a device driver 81->171 93 powershell.exe 81->93         started        95 CasPol.exe 81->95         started        signatures27 process28 process29 97 conhost.exe 93->97         started       
Threat name:
Win32.Trojan.Amadey
Status:
Malicious
First seen:
2023-04-29 22:25:52 UTC
File Type:
PE (Exe)
Extracted files:
235
AV detection:
29 of 36 (80.56%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:gena botnet:life discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Amadey
Modifies Windows Defender Real-time Protection settings
RedLine
Malware Config
C2 Extraction:
212.113.119.255/joomla/index.php
185.161.248.73:4164
Unpacked files
SH256 hash:
f3df0d29138b19fbd0869474e7060f3dc79aa16f6467043b338a86c5b534e1e4
MD5 hash:
3560774b39ee53a53252760a26e5ff0e
SHA1 hash:
d6d9d4a3d66ca2b83ffee3f3a781cfbdd3653533
Detections:
HealerAVKiller
SH256 hash:
ba638cf0c88c2f2be51941734f14ec6ef4d3ec374b848ea181e545e4ce646e89
MD5 hash:
24dae5054a0797b7a2a1fb96cd049f35
SHA1 hash:
bbbe5ace340f4822b315dfad4d34be300b6e6062
SH256 hash:
2471473709c9c56a4fdfee2420ead9dd1604b66e8352e5e5686723629d1d77f7
MD5 hash:
ffbd3831141f5a446ec7513a950ca4a0
SHA1 hash:
a0367cbf08e6d9ac8ef1e4ec30aabf1444bf7374
Detections:
HealerAVKiller
SH256 hash:
ec7c76a1242f892ef6eca87048e2df929cd570123baa6efb216c8a4784062089
MD5 hash:
3bd3848d23b0e66124b451858276d0cc
SHA1 hash:
0faf8814fb89247b134b57a6abf3eafe76605ea3
SH256 hash:
595aa92f6a7415468926141061cb7247f340b1c064f01ec3ebb45ce75fadab98
MD5 hash:
a8fd7d107b102caa87d22edff37b82b8
SHA1 hash:
15d98c6b667f518430bcd383611b1756618afbac
SH256 hash:
cc04e9c1ff20ce23ccc080f7e5a1cc0602c808c685bdc50ee1f2fd5ced708a7e
MD5 hash:
01cf03d9c2e5962d58cc3d3467806ba8
SHA1 hash:
e5f0ee65b3fb0bfdd074f5b8278fcd5b89fa1e99
Detections:
HealerAVKiller
Parent samples :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 hash:
0b7a477eda1d5160a9984d57dd012aaa4bc7691173cd795620ce730afac0eb67
MD5 hash:
97ae60c849d25377ae1bb2fc09a7d7ec
SHA1 hash:
91ae32dcdfe19f4d88f63da4f09cc246be4be35b
Detections:
Amadey
SH256 hash:
8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
MD5 hash:
f16fb63d4e551d3808e8f01f2671b57e
SHA1 hash:
781153ad6235a1152da112de1fb39a6f2d063575
SH256 hash:
412697fa678ea3cecfd2e117afaf6b2899ecfe43465e6a1be2def9fb0a77d4d1
MD5 hash:
b58e9dbfb49d9c6093c88844971a8250
SHA1 hash:
53a8a8ee3424eba50a860e5c88d878afbe64aa98
SH256 hash:
1782a231afdb9f7dd459dc8e10c1cab56cfc6f4fd771619836b9568d938c34c8
MD5 hash:
47e29902de8f43fb2b6429b1f9446e6b
SHA1 hash:
495400b53ea4ec846abedacaf42c899eedc5d612
SH256 hash:
f29700104ba3b4accd3d9a22ad63aefabdf94b8fdb40723507ade505436a8e8f
MD5 hash:
13f6aa9dd58f61b287ab2378dd11cd98
SHA1 hash:
c6d6079779918fb2c06fb143587284864239b93c
SH256 hash:
0ffa2c280a86db53288513adb5af197a2db7903ba1d9edc9cd8f772c5f927a31
MD5 hash:
6763684a45058078a53159ed4137c3c5
SHA1 hash:
3ad30348b241139c14f02e39015041541a6d6f85
SH256 hash:
1bf8638a91190e3d6107b1943fb70168db47f5ce320ca582217989bfd052d1ea
MD5 hash:
654461a0317681e5c0a066da1efc34e3
SHA1 hash:
c2a7b34cd8373147f958b14a4318c71169ba5818
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 1bf8638a91190e3d6107b1943fb70168db47f5ce320ca582217989bfd052d1ea

(this sample)

  
Delivery method
Distributed via web download

Comments