MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1dc1c512bf8786c4cafd8c03835f96cccdd79e7e55b4a917b5527c52261cfbe8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: 1dc1c512bf8786c4cafd8c03835f96cccdd79e7e55b4a917b5527c52261cfbe8
SHA3-384 hash: fe6f6993f9bb966b602e021c032f58dc5d50a346267550b6cb21819a020bc710d962e9d27495f88ff82fa550a46a72f0
SHA1 hash: 05d09ea9f630414588f9fcb9bb8a9a280081cde2
MD5 hash: 3a34d725352dad0ae2d4835c0021fc62
humanhash: kilo-emma-orange-timing
File name:PO specification dt.18-11-21.png.exe
Download: download sample
Signature RedLineStealer
File size:633'787 bytes
First seen:2021-11-19 06:01:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3eaa732d4dae53340f9646bdd85dac41 (11 x NetSupport, 6 x RedLineStealer, 4 x ISRStealer)
ssdeep 12288:uw35dS4X8AnVqBccQsWvOJ4sMpamA/d/S5bkvgVWSxIJFHSiK:H35dPp+j4std/BvgVW5FrK
Threatray 225 similar samples on MalwareBazaar
TLSH T18DD4C0A2F940ACF4E93B8030747EDA307859FC3E55A049CE77C87A6C1572953E51AB2B
File icon (PE):PE icon
dhash icon c3c74d4d05233d3c (2 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
3.17.7.232:10655

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
3.17.7.232:10655 https://threatfox.abuse.ch/ioc/250766/

Intelligence


File Origin
# of uploads :
1
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO specification dt.18-11-21.png.exe
Verdict:
Malicious activity
Analysis date:
2021-11-19 06:04:34 UTC
Tags:
stealer trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Launching a process
Launching a service
Creating a file
Changing a file
Delayed writing of the file
Creating a process from a recently created file
DNS request
Unauthorized injection to a recently created process
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Multi AV Scanner detection for domain / URL
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2021-11-19 06:02:08 UTC
AV detection:
17 of 44 (38.64%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Unpacked files
SH256 hash:
0809f0661b7fb6432f7563d4720516d8a87667ee21683e4134c92a4a8a8e7f6e
MD5 hash:
f852fc4b1b57a409760cd6434d285412
SHA1 hash:
a6f01dd19b365e923e1c52161b32778ac0ae2331
SH256 hash:
1dc1c512bf8786c4cafd8c03835f96cccdd79e7e55b4a917b5527c52261cfbe8
MD5 hash:
3a34d725352dad0ae2d4835c0021fc62
SHA1 hash:
05d09ea9f630414588f9fcb9bb8a9a280081cde2
Malware family:
RedLine
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments