MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 20da317121146505720e1df1fdcc539b2b25c3801c4dd0fc21c89bf6129f0a33. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments

SHA256 hash: 20da317121146505720e1df1fdcc539b2b25c3801c4dd0fc21c89bf6129f0a33
SHA3-384 hash: 5fd2253cc19a3d700355dc90e51fc52d06288355abbd4abd7d554244552e71a231d6647eb959938aff9db60cd0ab83e8
SHA1 hash: d0108ded5ef1ef5841b73795dc822435d90a12b7
MD5 hash: 2552488d4c782fabe6330f05f37b5d2b
humanhash: violet-jersey-december-december
File name:20da317121146505720e1df1fdcc539b2b25c3801c4dd0fc21c89bf6129f0a33
Download: download sample
Signature RedLineStealer
File size:6'243'490 bytes
First seen:2022-07-25 22:21:39 UTC
Last seen:2022-07-27 17:27:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ab9ff6e4872ea2766a5f5c6af5649e9d (20 x CryptOne, 13 x RedLineStealer, 6 x RecordBreaker)
ssdeep 98304:mJ4W4uNR5z/cY9/W002H/yo7MIvxeVJZozOfmGlIjaJ4h8wMs9D4VTZ1ZyORnDr8:mJPNA4NV/nvEWzOfHlIjaMos14V5RnD4
TLSH T10F5633B6B981C5B0D4F30570D9EE9770D72A39E10E37869F4390231A5727AF06A2E772
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon e89653c94971b6e8 (1 x XFilesStealer, 1 x RedLineStealer)
Reporter crep1x
Tags:exe RedLineStealer vidar

Intelligence


File Origin
# of uploads :
2
# of downloads :
437
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a file
DNS request
Sending a custom TCP request
Creating a process with a hidden window
Sending an HTTP GET request
Creating a file in the %AppData% directory
Running batch commands
Using the Windows Management Instrumentation requests
Launching a process
Delayed reading of the file
Creating a file in the Program Files subdirectories
Modifying a system file
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Unauthorized injection to a browser process
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Tandem Espionage
Verdict:
Malicious
Result
Threat name:
Nitol, Raccoon Stealer v2, RedLine, Vida
Detection:
malicious
Classification:
bank.troj.adwa.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (creates a PE file in dynamic memory)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically)
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Nitol
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 673222 Sample: mLtELLXIJs Startdate: 26/07/2022 Architecture: WINDOWS Score: 100 145 Snort IDS alert for network traffic 2->145 147 Malicious sample detected (through community Yara rule) 2->147 149 Antivirus detection for URL or domain 2->149 151 19 other signatures 2->151 8 mLtELLXIJs.exe 14 2->8         started        11 rundll32.exe 2->11         started        13 f.exe 2->13         started        process3 file4 93 C:\Users\user\AppData\...\License Keys.exe, PE32 8->93 dropped 95 C:\Users\user\AppData\Local\Temp\...\losa.exe, PE32 8->95 dropped 97 C:\Users\user\AppData\Local\Temp\...\file.exe, PE32 8->97 dropped 99 3 other files (none is malicious) 8->99 dropped 16 Install.exe 8->16         started        19 file.exe 17 8->19         started        22 dngondon1.exe 3 8->22         started        24 License Keys.exe 2 8->24         started        26 rundll32.exe 11->26         started        167 Writes to foreign memory regions 13->167 169 Allocates memory in foreign processes 13->169 171 Creates a thread in another existing process (thread injection) 13->171 173 Injects a PE file into a foreign processes 13->173 signatures5 process6 dnsIp7 71 C:\Program Files (x86)\...\tag12312341.exe, PE32 16->71 dropped 73 C:\Program Files (x86)\...\safert44.exe, PE32 16->73 dropped 75 C:\Program Files (x86)\...\romb_ro.exe, PE32 16->75 dropped 85 5 other malicious files 16->85 dropped 29 F0geI.exe 16->29         started        34 romb_ro.exe 16->34         started        40 10 other processes 16->40 113 yesilyasam.eu 185.175.200.64, 443, 49742, 49743 ASTRALUSNL Netherlands 19->113 115 192.168.2.1 unknown unknown 19->115 77 C:\Users\user\AppData\Roaming\00004823..exe, PE32 19->77 dropped 79 C:\Users\user\AppData\Roaming\00000029..exe, PE32 19->79 dropped 87 2 other files (none is malicious) 19->87 dropped 36 00004823..exe 19->36         started        42 2 other processes 19->42 81 C:\Users\user\AppData\Local\...\dngondon.exe, PE32 22->81 dropped 83 C:\Users\user\AppData\Local\...\logger 1.exe, PE32 22->83 dropped 44 2 other processes 22->44 46 2 other processes 24->46 161 Writes to foreign memory regions 26->161 163 Allocates memory in foreign processes 26->163 165 Creates a thread in another existing process (thread injection) 26->165 38 svchost.exe 26->38 injected 48 4 other processes 26->48 file8 signatures9 process10 dnsIp11 131 146.19.247.91 FITC-ASUS France 29->131 101 C:\Users\user\AppData\...\vcruntime140.dll, PE32 29->101 dropped 103 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 29->103 dropped 105 C:\Users\user\AppData\LocalLow\softokn3.dll, PE32 29->105 dropped 111 4 other files (none is malicious) 29->111 dropped 175 Tries to harvest and steal browser information (history, passwords, etc) 29->175 177 Tries to steal Crypto Currency Wallets 29->177 133 91.242.229.63 LANTRACE-LLCUA Ukraine 34->133 179 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 34->179 107 C:\Users\user\AppData\Roaming\...\f.exe, PE32 36->107 dropped 181 Drops PE files to the startup folder 36->181 183 Writes to foreign memory regions 36->183 185 Allocates memory in foreign processes 36->185 199 2 other signatures 36->199 50 yLMRxqpFDoffj.exe 36->50 injected 67 2 other processes 36->67 187 System process connects to network (likely due to code injection or exploit) 38->187 189 Sets debug register (to hijack the execution of another thread) 38->189 191 Modifies the context of a thread in another process (thread injection) 38->191 52 svchost.exe 38->52         started        135 103.89.90.61 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 40->135 141 3 other IPs or domains 40->141 57 chrome.exe 40->57         started        69 7 other processes 40->69 137 87.251.77.179 HOSTKEY-ASNL Russian Federation 42->137 193 Uses ping.exe to check the status of other devices and networks 42->193 59 PING.EXE 42->59         started        61 conhost.exe 42->61         started        139 iplogger.org 148.251.234.83, 443, 49740 HETZNER-ASDE Germany 44->139 195 Detected unpacking (changes PE section rights) 44->195 197 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 44->197 63 dngondon.exe 44->63         started        143 2 other IPs or domains 46->143 109 C:\Users\user\AppData\Local\Temp\db.dll, PE32 46->109 dropped 65 conhost.exe 46->65         started        file12 signatures13 process14 dnsIp15 117 208.95.112.1 TUT-ASUS United States 52->117 127 2 other IPs or domains 52->127 89 C:\Users\user\AppData\Local\...\Login Data.db, SQLite 52->89 dropped 91 C:\Users\user\AppData\Local\...\Cookies.db, SQLite 52->91 dropped 153 Query firmware table information (likely to detect VMs) 52->153 155 Installs new ROOT certificates 52->155 157 Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically) 52->157 159 Tries to harvest and steal browser information (history, passwords, etc) 52->159 119 142.250.181.227 GOOGLEUS United States 57->119 121 142.250.184.237 GOOGLEUS United States 57->121 129 7 other IPs or domains 57->129 123 127.0.0.1 unknown unknown 59->123 125 15.235.171.56 HP-INTERNET-ASUS United States 63->125 file16 signatures17
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2022-07-23 20:35:23 UTC
File Type:
PE (Exe)
Extracted files:
74
AV detection:
37 of 41 (90.24%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:eternity family:redline family:vidar botnet:1521 botnet:4 botnet:@tag12312341 botnet:nam3 botnet:vukong discovery infostealer spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
Downloads MZ/PE file
Executes dropped EXE
Detects Eternity stealer
Eternity
Process spawned unexpected child process
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
15.235.171.56:30730
103.89.90.61:18728
31.41.244.134:11643
62.204.41.144:14096
http://rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion
https://t.me/korstonsales
https://climatejustice.social/@ffoleg94
Unpacked files
SH256 hash:
e0eec0c067706cbfb574a7468593c5b4ccd740f8a509a0d14de05185cceeb3ab
MD5 hash:
7e342abbbc7c9ea9c18b655d53ac5148
SHA1 hash:
e4fb0c555e1befdc4e42d3699d9dc6cfe1dad168
SH256 hash:
e245c4a7d41e095b5c5136a89e698bd11e452594d864e250607cff2b2efadbab
MD5 hash:
6c991f5490cd23d8df31d89864395b21
SHA1 hash:
a6e3fde5d6f72fce36c5a8955a6025d92efb4356
SH256 hash:
3532741204df2f9f04dc6717dc17774eecb2b157577bba5eafdaf6943f841ec9
MD5 hash:
9d0566acca9d5ff8cb68779913668435
SHA1 hash:
074d5a054467c93b538c648e72ee0d71e42b5a72
SH256 hash:
4e5f4a021f712077e5d111451a5ee65efafbbd5e6a8a7da7e8cd235471da0590
MD5 hash:
64541d4e767bbb172a4970d0523324c1
SHA1 hash:
dc2326289d9e8030baa093bb1ed57ef58d766335
SH256 hash:
225a8241e24272a56a4693e62b21f76efd55a5ea1475a9a1439bb9b9a6dfbba7
MD5 hash:
02205b33e0905502c07c20dcd1d1e2ca
SHA1 hash:
b465d6426a7ad345daf210066faed75561c0dd5d
SH256 hash:
119dc21013620a3c6a647f2b4f9c1c35d904c23c6f25e7e423e376911177e8a2
MD5 hash:
1d44852c79f46473bd1dbbc9c6a186e9
SHA1 hash:
6adace3647fa46675227b947f6bff4a4bef05cca
SH256 hash:
3a07136d3e24e057fd369cc9a0c2ce505f25e69648dc3a5668f4c8ff3365453f
MD5 hash:
99384934ae3f864bc7c37fcc42f7836f
SHA1 hash:
d7692e7cfc4996ed090f315e9427406490b8f5b3
SH256 hash:
43b5090705701e58990e670c47e7ea4b151f27d1547a134842af1649fd0f0382
MD5 hash:
51dd867142bbc8a21527c1d3792c31f2
SHA1 hash:
7155e4b1b352f45ef7585c49ca5bb3adb51f4c50
SH256 hash:
20da317121146505720e1df1fdcc539b2b25c3801c4dd0fc21c89bf6129f0a33
MD5 hash:
2552488d4c782fabe6330f05f37b5d2b
SHA1 hash:
d0108ded5ef1ef5841b73795dc822435d90a12b7
Malware family:
BlackWorm
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments