MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2060aa18d5fe250653f77f3648c9f0c611ec5c5a1507c9160c3bf7d6d4d26a19. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 5 File information Comments

SHA256 hash: 2060aa18d5fe250653f77f3648c9f0c611ec5c5a1507c9160c3bf7d6d4d26a19
SHA3-384 hash: bd656a924ea99127eb45c6e278cc84d6bc84e26ce7162f5123718c2cce518a55ad6cf6efd55df2b8e4d657c1f14d8fe4
SHA1 hash: 3931f58df8eda42ea1b63c05c7dc20a4009904bb
MD5 hash: e49eeb14123016e8b3304ab9fe55dcfe
humanhash: wyoming-harry-early-india
File name:file
Download: download sample
Signature RedLineStealer
File size:387'072 bytes
First seen:2023-05-13 09:01:22 UTC
Last seen:2023-05-13 09:56:40 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 35ef05be164f53c2e9ceeaa45e5d99c2 (2 x RedLineStealer, 1 x Amadey, 1 x Tofsee)
ssdeep 6144:/ExdJLVrkCpJYDDBFIaqm6HFcHEORvd1kHdxaPy8WudWaLT30:/KBrtHYD9FIp7gR3kHd58WulLz0
Threatray 15 similar samples on MalwareBazaar
TLSH T19A849E0392A26C54F5664F73BE2EC6E8662EF5E24F5967AB12289E2F04701F1C573313
TrID 59.6% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
15.0% (.EXE) Win64 Executable (generic) (10523/12/4)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.9% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon 0004013110323108 (1 x RedLineStealer)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://109.206.243.208/1.exe

Intelligence


File Origin
# of uploads :
3
# of downloads :
445
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-05-13 09:03:25 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Reading critical registry keys
Creating a file
Launching the default Windows debugger (dwwin.exe)
Sending a TCP request to an infection source
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed xpack
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2023-05-13 09:02:07 UTC
File Type:
PE (Exe)
Extracted files:
36
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine payload
Unpacked files
SH256 hash:
00477b9887ae01e0f04d8f338bfcbdcd7a535e07dae0f63f53a7602c29404697
MD5 hash:
1626aa1b977775332119e3ddcc29e45b
SHA1 hash:
b4c3681d94d1667ad6414c1b5664f9d57c2cbed1
SH256 hash:
1ed362bd7d4b682224053fa379fcac9d54180a5e041322b2c953997d89657ba6
MD5 hash:
98aa601d789d28959d6601ab55c05403
SHA1 hash:
b1a4e327e69dedf2ff818ff5feb6cf4e9e5e7245
Detections:
redline
Parent samples :
8a5196e87b538452033124cdf3c1b1be15db47139186223e6dc4e9e3d0ced4a8
07d2a39f5c3d310fc233d63a5db81605fbc76e9ddc73bafd46990400e686ee22
0774333fa07a5fbf06d0bb8f974b172d93cb9ed871eec5d497828dd458379171
b68bd5f437195007eab47596498cf7f8723a6b13631f92c2266a5825c902b486
93cea09cdb6ed12a8764adb71ad6927e3fdec062bf990fa4f03a0a90b7ca99a1
1f1c0b1fe4cc909e2af8249206e881acc719e1fc140d92a0bfb6e13d19cc1284
f3ae45b1b3d94db9082f02588979131b612302d97a0be10b257ec0e1f0e81419
c9905ac331cdcc2b38b3fd5f1a322a6a3dae8d0d40dfc27b709c025983c60dad
2060aa18d5fe250653f77f3648c9f0c611ec5c5a1507c9160c3bf7d6d4d26a19
449b58af2fe540952c6ea157c40d057c6f222c852758e0ac4e7ee8fb1e4bbe1c
2838a5f755828b934513d46794fdc5f2ad3f9561ad28bd2a1d79014d918fe6b2
d412b470c109a826cd9e520859a2f0934030671bb91650da34ad90cf73145172
4139ec93b8326c63804ba853eb68557b1e84afb2eedd7d2ecf95d86243f17d52
fd261725d912617f603ae58cc680aa4085fd0621726b53612b52bed144455581
8c095eaadab1975396316aa382d1f5bac036628e5ca9b0b5f2b4fbccdef51e5c
c66bc7b7d3242a3da4dbe585b0672264363733f1ae0aa36f2688bc45a0ff5271
bc32d1684e8321e03560ad51895db528547cb3dbbfc11f35b6f5dfd28c60fcfd
12f64f73b7e5766f160c228cadc63fa0101ec8db2a3427e7a3687eb84be130c1
0449f1701752d10ee22a97303ecf7bf6d333eb43c50ab64471ad8bb8437c57c6
87bbb3e24c1924289a6f3618f67d966eb41d655ea1c3e40b89f9afe4d2029d50
3f69c31d5595c759338ba61c5464d806e2c41e5667ce6e5f79f77a127b331acb
0b031cc034caaa64b1c04af46f75ad0ef11927faebc4885f5f9b6712653d1232
1636a6f0289d65e737dd5731d9b64376a680772eb48ba504caaffc3566e9c79b
1fa4e8b515f26aa53d2feb59cbf0932b55063e4c0420d5df4f849cfb281868e7
47acd892aa621ca805a38b54f6b5b4ec6217a8e232c53971108497a1f4b54e67
SH256 hash:
ebe79cc234d61699a38624ddafd2cb2605b73bc2fca7daa9b8dec73a2205603b
MD5 hash:
c64f65436bebb9cfbac4cfa91af57641
SHA1 hash:
1df3ca0b3366a55d68a2c6595152cca977640766
Detections:
redline
Parent samples :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 hash:
2060aa18d5fe250653f77f3648c9f0c611ec5c5a1507c9160c3bf7d6d4d26a19
MD5 hash:
e49eeb14123016e8b3304ab9fe55dcfe
SHA1 hash:
3931f58df8eda42ea1b63c05c7dc20a4009904bb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments