MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 275b527d14d8cfd6494cda04718e8e77a05a8779d034119d1772590be6257348. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 275b527d14d8cfd6494cda04718e8e77a05a8779d034119d1772590be6257348
SHA3-384 hash: fd69a886b6e7249e9b11336f2bb448cf5374dfc608d59b45ccbb55679dc073077399792444dd3902064bab34bc59edfe
SHA1 hash: 5ced5ae95a3d4a302204a9c223e1ff0f0d161bd8
MD5 hash: 46af013ac14876ab502aef13540bd007
humanhash: massachusetts-texas-juliet-south
File name:46AF013AC14876AB502AEF13540BD007.exe
Download: download sample
Signature RedLineStealer
File size:66'560 bytes
First seen:2021-03-23 08:17:50 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d59a4a699610169663a929d37c90be43 (75 x DCRat, 22 x njrat, 15 x SalatStealer)
ssdeep 1536:8ByJp55OIIXALvworgstXLniZrNvkIYzhtE5:8BS1IXAL4DWXzi0tE5
Threatray 88 similar samples on MalwareBazaar
TLSH D3537D13775A873BE7BF4BB8B87192514374E2602A22F7A38FC962591C633804E25777
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://93.115.20.247:40355/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://93.115.20.247:40355/ https://threatfox.abuse.ch/ioc/4589/

Intelligence


File Origin
# of uploads :
1
# of downloads :
127
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
46AF013AC14876AB502AEF13540BD007.exe
Verdict:
Malicious activity
Analysis date:
2021-03-23 08:31:53 UTC
Tags:
rat redline trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a process from a recently created file
Searching for the window
Running batch commands
DNS request
Sending a custom TCP request
Launching a process
Creating a file
Sending a UDP request
Sending an HTTP POST request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Deleting a recently created file
Unauthorized injection to a recently created process
Stealing user critical data
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Binary contains a suspicious time stamp
Contains functionality to inject threads in other processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 373798 Sample: Ck6I6BRXnX.exe Startdate: 23/03/2021 Architecture: WINDOWS Score: 100 40 Antivirus detection for URL or domain 2->40 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 5 other signatures 2->46 7 Ck6I6BRXnX.exe 3 2->7         started        process3 file4 24 C:\Users\user\AppData\...\Triticeous.exe, PE32 7->24 dropped 26 C:\Users\user\AppData\...Zinjector.v2.exe, PE32 7->26 dropped 10 Triticeous.exe 15 3 7->10         started        14 EZinjector.v2.exe 1 7->14         started        process5 dnsIp6 32 7y1s.himerg.ru 81.177.140.11, 443, 49706 RTCOMM-ASRU Russian Federation 10->32 48 Multi AV Scanner detection for dropped file 10->48 50 Machine Learning detection for dropped file 10->50 52 Writes to foreign memory regions 10->52 56 3 other signatures 10->56 16 AddInProcess32.exe 14 23 10->16         started        54 Contains functionality to inject threads in other processes 14->54 20 conhost.exe 14->20         started        22 cmd.exe 1 14->22         started        signatures7 process8 dnsIp9 28 api.ip.sb 16->28 30 93.115.20.247, 40355, 49715, 49718 MVPShttpswwwmvpsnetEU Romania 16->30 34 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->34 36 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->36 38 Tries to harvest and steal browser information (history, passwords, etc) 16->38 signatures10
Threat name:
Win32.Trojan.Delf
Status:
Malicious
First seen:
2021-03-20 03:05:03 UTC
AV detection:
27 of 28 (96.43%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline infostealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Loads dropped DLL
Executes dropped EXE
RedLine
Unpacked files
SH256 hash:
3f194e54c089c9f96997215f85652d91b8a6f04c144e5d6fbbcc977c6a80724b
MD5 hash:
e86d0d7009f54fdc6aa2a276878740d9
SHA1 hash:
d6f53d886910881578dd0c1ef4abfde27946a59e
SH256 hash:
275b527d14d8cfd6494cda04718e8e77a05a8779d034119d1772590be6257348
MD5 hash:
46af013ac14876ab502aef13540bd007
SHA1 hash:
5ced5ae95a3d4a302204a9c223e1ff0f0d161bd8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments