MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 6 File information Comments

SHA256 hash: 1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94
SHA3-384 hash: 93035357c0d63ff5e3179bbf68cb3ca58a132f63705b817bc03070ec219875f5ae10fb82e4c584b84188414eefbfc2b3
SHA1 hash: 99bff391433cfc610b27f3b2b7ebc3239314f831
MD5 hash: 3c55617e6b69330386a0350e9f6aa0b4
humanhash: king-finch-zulu-emma
File name:SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709
Download: download sample
Signature RedLineStealer
File size:2'463'904 bytes
First seen:2023-07-12 18:30:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4328f7206db519cd4e82283211d98e83 (533 x RedLineStealer, 18 x Arechclient2, 15 x DCRat)
ssdeep 49152:X4MR20Q9Xz2p2pizrXPHaBXtHqNQ6cBUX0biao10PzFyPawde5Gir:X41MEpyHaZUNFcBUEfoIgPFTir
Threatray 390 similar samples on MalwareBazaar
TLSH T1C5B5335DAAEDFBADC879177D9079EE1293BE94823E457080EB7CDFC8A7F08851112085
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4505/5/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon fcdcf8f0c8c8c4c8 (1 x RedLineStealer)
Reporter SecuriteInfoCom
Tags:exe RedLineStealer signed

Code Signing Certificate

Organisation:Lenovo IdeaPad 3 15ITL6 82H80394AK
Issuer:Lenovo IdeaPad 3 15ITL6 82H80394AK
Algorithm:sha1WithRSAEncryption
Valid from:2023-07-11T10:24:07Z
Valid to:2033-07-12T10:24:07Z
Serial number: 592e76064304cba1486c06625134fd6d
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: b5e7c46e4468ef25a69f19001a210e3e44d4aeb293e5b4ac322306456daabd76
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
297
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709
Verdict:
Malicious activity
Analysis date:
2023-07-12 18:33:02 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Searching for analyzing tools
Launching a process
Creating a file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a window
Сreating synchronization primitives
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file in the %AppData% subdirectories
Forced shutdown of a system process
Query of malicious DNS domain
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
masquerade overlay packed packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates files in the system32 config directory
Detected unpacking (changes PE section rights)
Detected VMProtect packer
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the hosts file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1271993 Sample: SecuriteInfo.com.BScope.Tro... Startdate: 12/07/2023 Architecture: WINDOWS Score: 100 61 lpls.tuktuk.ug 2->61 69 Snort IDS alert for network traffic 2->69 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 11 other signatures 2->75 9 SecuriteInfo.com.BScope.TrojanPSW.Agent.13181.4709.exe 1 2->9         started        13 updater.exe 2->13         started        15 cmd.exe 1 2->15         started        17 6 other processes 2->17 signatures3 process4 file5 59 SecuriteInfo.com.B....13181.4709.exe.log, ASCII 9->59 dropped 97 Detected unpacking (changes PE section rights) 9->97 99 Query firmware table information (likely to detect VMs) 9->99 101 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->101 115 3 other signatures 9->115 19 AppLaunch.exe 15 7 9->19         started        103 Adds a directory exclusion to Windows Defender 13->103 105 Hides threads from debuggers 13->105 107 Tries to detect sandboxes / dynamic malware analysis system (registry check) 13->107 109 Uses powercfg.exe to modify the power settings 15->109 111 Modifies power options to not sleep / hibernate 15->111 24 conhost.exe 15->24         started        26 sc.exe 1 15->26         started        28 sc.exe 1 15->28         started        36 3 other processes 15->36 113 Creates files in the system32 config directory 17->113 30 conhost.exe 17->30         started        32 conhost.exe 17->32         started        34 powercfg.exe 17->34         started        38 5 other processes 17->38 signatures6 process7 dnsIp8 63 rcam.tuktuk.ug 85.209.3.4, 11290, 49692 SQUITTER-NETWORKSNL Russian Federation 19->63 65 159.223.216.123, 49696, 80 CELANESE-US United States 19->65 67 192.168.2.1 unknown unknown 19->67 49 C:\Users\user\AppData\Local\...\TaskMnr.exe, PE32+ 19->49 dropped 51 C:\Users\user\AppData\Local\Temp\Octium.exe, MS-DOS 19->51 dropped 77 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->77 79 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->79 81 Tries to harvest and steal browser information (history, passwords, etc) 19->81 83 Tries to steal Crypto Currency Wallets 19->83 40 Octium.exe 1 2 19->40         started        44 TaskMnr.exe 1 19->44         started        file9 signatures10 process11 file12 53 C:\Users\user\AppData\Roaming\...\ntlhost.exe, MS-DOS 40->53 dropped 85 Detected unpacking (changes PE section rights) 40->85 87 Query firmware table information (likely to detect VMs) 40->87 89 Hides threads from debuggers 40->89 46 ntlhost.exe 40->46         started        55 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 44->55 dropped 57 C:\Windows\System32\drivers\etc\hosts, ASCII 44->57 dropped 91 Modifies the hosts file 44->91 93 Adds a directory exclusion to Windows Defender 44->93 95 Tries to detect sandboxes / dynamic malware analysis system (registry check) 44->95 signatures13 process14 signatures15 117 Detected unpacking (changes PE section rights) 46->117 119 Query firmware table information (likely to detect VMs) 46->119 121 Tries to detect sandboxes and other dynamic analysis tools (window names) 46->121 123 2 other signatures 46->123
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-07-12 17:29:11 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
23 of 38 (60.53%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:laplas family:redline botnet:120723_rc_11 clipper evasion infostealer persistence spyware stealer themida trojan
Behaviour
Creates scheduled task(s)
GoLang User-Agent
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks whether UAC is enabled
Checks BIOS information in registry
Executes dropped EXE
Loads dropped DLL
Themida packer
Downloads MZ/PE file
Drops file in Drivers directory
Stops running service(s)
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Laplas Clipper
RedLine
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
rcam.tuktuk.ug:11290
http://lpls.tuktuk.ug
Unpacked files
SH256 hash:
1338affe17ec91937318e44db71bef44cc278315be38fabb8052d62b4856599e
MD5 hash:
544f0fa1cd1297518986a5d847c7e1f3
SHA1 hash:
7d708ffe1e8d818562ea1214447926a3b6ae5804
SH256 hash:
f572839e4a537102fea5473b50d6e6539d1517fe937e587ef527591939684c2c
MD5 hash:
209d7db779846d2945fe594e19ad8064
SHA1 hash:
d3478407678070e261b0bfe05393c5faee22c068
Detections:
redline
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
bfa12a2456d40d6c32a1f4e35bd43c81f6f67466234faed8fec19397d0e6d808
MD5 hash:
7a7927bac28be846b2fd2a5d10ba0676
SHA1 hash:
67a7b8616fc8e7aa7bb7a6e2521548e67a7caa2d
SH256 hash:
1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94
MD5 hash:
3c55617e6b69330386a0350e9f6aa0b4
SHA1 hash:
99bff391433cfc610b27f3b2b7ebc3239314f831
Malware family:
RedLine.E
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_imphash
Rule name:PE_Potentially_Signed_Digital_Certificate
Author:albertzsigovits
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 1ca6070d9a141d51ccc4f75ab90095cc7fa3791c54ec10ee042b96a815822c94

(this sample)

  
Delivery method
Distributed via web download

Comments