MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1d64d3eb1c28bda9e53ed296e9a84092b655deb5fb27aac6ee6d99c65ee6f118. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 1d64d3eb1c28bda9e53ed296e9a84092b655deb5fb27aac6ee6d99c65ee6f118
SHA3-384 hash: 268b6eadc7d046ecc60d1a23e53fafb1ee49b41e3ae1d9cf02bce2675dd4b0fce375a3cb4c539e982cef36f3270b91ff
SHA1 hash: bf7868038d82b2f832ca4c400dd4cb6b501614e2
MD5 hash: 3b6605e0b78a30f733dd78af9708b13c
humanhash: idaho-aspen-east-mississippi
File name:discord_gen.exe
Download: download sample
Signature RedLineStealer
File size:551'560 bytes
First seen:2021-06-24 21:26:20 UTC
Last seen:2021-06-24 21:36:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 12288:lNpszYhvXWSVJdMae9X7wRJ8pGt68+MbJWCcHouV1:bhvJVJdMV7wktntog
Threatray 166 similar samples on MalwareBazaar
TLSH E5C4E042FBD1A4B2E22118322565B7606ABDF9201F148AEFE3D85A1DFD701D0A731ED7
Reporter Anonymous
Tags:exe gaming RedLineStealer


Avatar
Anonymous
We run a multi-gaming organisation/multi-game guild with a large amount of members, and receive targetted spearphishing and non-targetted malware typically RATs or keyloggers, attempting to compromise accounts and steal items.

Intelligence


File Origin
# of uploads :
2
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
discord_gen.exe
Verdict:
Malicious activity
Analysis date:
2021-06-24 21:13:53 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Antivirus detection for dropped file
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-06-24 21:27:16 UTC
AV detection:
15 of 29 (51.72%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@soulscreen discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.92.148.234:28092
Unpacked files
SH256 hash:
cb1518a88429caf25c7a0ce507def54351a20f8456831543e137a61d190f3593
MD5 hash:
0fa213c0c322f55c0f9877a4fa6f7fe9
SHA1 hash:
c9d542235ee062398c93185b7037e4c4a48315a3
SH256 hash:
cca67c6621d7898f6af4c6feb399bcef7e2f14ef0278b485e999a3813e446834
MD5 hash:
1455cb5a3530091bc0474e610ac4f289
SHA1 hash:
72f81ca0110570ff8858e4f82d187268ac9b4dba
SH256 hash:
ec56dcdd197d8381ec220b51dbd195cc406efb8e75d6103c77ade1ea56e87316
MD5 hash:
36bc1449c7914533e3a46281a1f22644
SHA1 hash:
3cfde1e175996c6d12037f7ea183b988ed049c3e
SH256 hash:
1d64d3eb1c28bda9e53ed296e9a84092b655deb5fb27aac6ee6d99c65ee6f118
MD5 hash:
3b6605e0b78a30f733dd78af9708b13c
SHA1 hash:
bf7868038d82b2f832ca4c400dd4cb6b501614e2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 1d64d3eb1c28bda9e53ed296e9a84092b655deb5fb27aac6ee6d99c65ee6f118

(this sample)

  
Delivery method
Distributed via web download

Comments