MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1f9e76dd38415544387b94b6bb1cdf6d5df55e6bc2ce7f08600c37482e4be78d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 5 File information Comments

SHA256 hash: 1f9e76dd38415544387b94b6bb1cdf6d5df55e6bc2ce7f08600c37482e4be78d
SHA3-384 hash: daebfd6c74f49fb31faf4cd7545a5241e8691b21ba9eefc6132a68cf16b476a2ebed3b64864a6b929ea70006b9778c73
SHA1 hash: 830fb6ef705b9e450f406fc44d497f8fd23da0fa
MD5 hash: c0054e73bfcd26d2690b0b5094997463
humanhash: fanta-lactose-undress-burger
File name:c0054e73bfcd26d2690b0b5094997463.exe
Download: download sample
Signature RedLineStealer
File size:603'768 bytes
First seen:2021-11-01 10:16:00 UTC
Last seen:2021-11-01 11:55:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'614 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:9bE3a1SS6shI3o2so3dOOBZYnV5pAbpS4oKHWJibRk:8a1SYhEo2sA8G+AbpS4lHW0y
Threatray 2'959 similar samples on MalwareBazaar
TLSH T159D4E02023FC4D0AF2F98B78A0F641219B38FA637A17D76D15A1949D5C737908E3276B
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
178.23.190.135:25442

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
178.23.190.135:25442 https://threatfox.abuse.ch/ioc/241088/

Intelligence


File Origin
# of uploads :
2
# of downloads :
100
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
setup_x86_x64_install.exe
Verdict:
Malicious activity
Analysis date:
2021-11-01 03:40:16 UTC
Tags:
trojan rat redline evasion loader opendir stealer vidar formbook raccoon

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Deleting a recently created file
Creating a file
Creating a window
Blocking the Windows Defender launch
Blocking the User Account Control
Adding exclusions to Windows Defender
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.adwa.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
Changes security center settings (notifications, updates, antivirus, firewall)
Creates autostart registry keys with suspicious names
Drops PE files to the startup folder
Drops PE files with benign system names
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell adding suspicious path to exclusion list
Sigma detected: Powershell Defender Exclusion
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected RedLine Stealer
Yara detected UAC Bypass using CMSTP
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 512764 Sample: TlcS1mSLeX.exe Startdate: 01/11/2021 Architecture: WINDOWS Score: 100 83 Sigma detected: Powershell adding suspicious path to exclusion list 2->83 85 Multi AV Scanner detection for submitted file 2->85 87 Yara detected UAC Bypass using CMSTP 2->87 89 6 other signatures 2->89 8 TlcS1mSLeX.exe 9 15 2->8         started        12 svchost.exe 2->12         started        14 8CD8CA21.exe 2->14         started        16 7 other processes 2->16 process3 dnsIp4 61 C:\Users\user\AppData\...\8CD8CA21.exe, PE32 8->61 dropped 63 C:\Users\Public\Documents\...\svchost.exe, PE32 8->63 dropped 65 C:\Users\...\8CD8CA21.exe:Zone.Identifier, ASCII 8->65 dropped 75 4 other files (2 malicious) 8->75 dropped 93 Creates autostart registry keys with suspicious names 8->93 95 Drops PE files to the startup folder 8->95 97 Adds a directory exclusion to Windows Defender 8->97 99 Drops PE files with benign system names 8->99 19 8CD8CA21.exe 8->19         started        23 powershell.exe 26 8->23         started        25 AdvancedRun.exe 1 8->25         started        36 10 other processes 8->36 67 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 12->67 dropped 69 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 12->69 dropped 101 Multi AV Scanner detection for dropped file 12->101 28 AdvancedRun.exe 12->28         started        30 AdvancedRun.exe 12->30         started        77 2 other files (none is malicious) 14->77 dropped 32 AdvancedRun.exe 14->32         started        34 AdvancedRun.exe 14->34         started        79 127.0.0.1 unknown unknown 16->79 71 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 16->71 dropped 73 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 16->73 dropped 103 Changes security center settings (notifications, updates, antivirus, firewall) 16->103 file5 signatures6 process7 dnsIp8 57 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 19->57 dropped 59 C:\Users\user\AppData\...\AdvancedRun.exe, PE32 19->59 dropped 91 Adds a directory exclusion to Windows Defender 19->91 38 AdvancedRun.exe 19->38         started        40 AdvancedRun.exe 19->40         started        42 conhost.exe 23->42         started        81 192.168.2.1 unknown unknown 25->81 45 AdvancedRun.exe 25->45         started        47 AdvancedRun.exe 36->47         started        49 conhost.exe 36->49         started        51 conhost.exe 36->51         started        53 6 other processes 36->53 file9 signatures10 process11 signatures12 55 AdvancedRun.exe 38->55         started        105 Adds a directory exclusion to Windows Defender 42->105 process13
Threat name:
ByteCode-MSIL.Backdoor.Androm
Status:
Malicious
First seen:
2021-10-31 21:35:59 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:an one discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
System policy modification
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Executes dropped EXE
Nirsoft
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
Turns off Windows Defender SpyNet reporting
UAC bypass
Windows security bypass
Malware Config
C2 Extraction:
178.23.190.135:25442
Unpacked files
SH256 hash:
fd43b492b6e9990901d234a9497e6f0b44b4bec4a37d3620a895740665803679
MD5 hash:
9043039824d34a79ce01f21f411c9598
SHA1 hash:
fbb65849cdfcfd0bdf4e08ba55b4ff235043cb71
SH256 hash:
c2b340e0e9a6c0ecf01c8c39d290ac372353b48f12d0108df6f01b9ee3b3a79f
MD5 hash:
31d548260de4ca88499eb13a442fefaf
SHA1 hash:
eff37e1bf92b187907e8dfd161f2248509e95361
SH256 hash:
dcd3674a17756d39a33d93fdb8127afa7eb45595686bbadb6abba532e4c70fff
MD5 hash:
55e96acd8cfd0d195c1321a56be788fc
SHA1 hash:
b1289936d15279a694cc0713e254eae3cdc8a855
SH256 hash:
3da80bd8e18bf2ef5e28f5e2e0d2095b0d4e65391800ce18f9a18859d7beb220
MD5 hash:
5dbed7594d4c8d71c1882692e6776bf0
SHA1 hash:
8552a2f2afca501945fe57c1875970b6f777f709
SH256 hash:
8063623fd33585184e865ac1f8685446c819841d212bc6c848f8dc4a137960be
MD5 hash:
4abff34e351e4e95514aecb515e8aea3
SHA1 hash:
742702e8c78e7cf19f19e56a6cdb2d1811759710
SH256 hash:
1f9e76dd38415544387b94b6bb1cdf6d5df55e6bc2ce7f08600c37482e4be78d
MD5 hash:
c0054e73bfcd26d2690b0b5094997463
SHA1 hash:
830fb6ef705b9e450f406fc44d497f8fd23da0fa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 1f9e76dd38415544387b94b6bb1cdf6d5df55e6bc2ce7f08600c37482e4be78d

(this sample)

  
Delivery method
Distributed via web download

Comments