MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2806b3e2aeb583cdd693ca9a024ea63222ee2c4582d66d95126635965ba919b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 5 File information Comments

SHA256 hash: 2806b3e2aeb583cdd693ca9a024ea63222ee2c4582d66d95126635965ba919b2
SHA3-384 hash: 0c048e0d5d3b342b6636ec68c6f84c06ba73f6e595589ccd8aee36695e1029c5b158fd677d5d830bddddc9e3858537f3
SHA1 hash: 3b9c529978e5b9293d9953bfc0766a2feecbc63b
MD5 hash: a7859e380614970e688306a9d9762f3e
humanhash: colorado-sodium-arkansas-missouri
File name:a7859e380614970e688306a9d9762f3e.exe
Download: download sample
Signature RedLineStealer
File size:3'594'032 bytes
First seen:2022-01-20 06:37:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 41304e4befbbd8a63ad6ec59f252160b (56 x RedLineStealer, 4 x RaccoonStealer, 2 x CoinMiner)
ssdeep 98304:X2CckkNV/t36fakgZtC2CdfwoOTD4qT3rHZzzIvE:mRNVV36fakgZtCojTD4Q3zZAM
Threatray 4 similar samples on MalwareBazaar
TLSH T12DF533B2458B7257FE8BE6F43A663F239F643EFCD29210091375DA4BB3821871B44529
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
37.252.7.150:26250

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
37.252.7.150:26250 https://threatfox.abuse.ch/ioc/305805/

Intelligence


File Origin
# of uploads :
1
# of downloads :
175
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Searching for the window
DNS request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Creating a process with a hidden window
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine TON Miner
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected TON Miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 556533 Sample: WA5VJsoSQf.exe Startdate: 20/01/2022 Architecture: WINDOWS Score: 100 77 Antivirus detection for URL or domain 2->77 79 Multi AV Scanner detection for submitted file 2->79 81 Yara detected TON Miner 2->81 83 8 other signatures 2->83 10 WA5VJsoSQf.exe 2->10         started        process3 signatures4 101 Writes to foreign memory regions 10->101 103 Allocates memory in foreign processes 10->103 105 Tries to detect virtualization through RDTSC time measurements 10->105 107 Injects a PE file into a foreign processes 10->107 13 AppLaunch.exe 15 7 10->13         started        18 WerFault.exe 23 11 10->18         started        20 WerFault.exe 2 11 10->20         started        22 WerFault.exe 11 10->22         started        process5 dnsIp6 69 37.252.7.150, 26250, 49793 NEPHAX-ASPL United Kingdom 13->69 71 cdn.discordapp.com 162.159.129.233, 443, 49801 CLOUDFLARENETUS United States 13->71 73 192.168.2.1 unknown unknown 13->73 65 C:\Users\user\...\Temptw21one_build.exe, PE32+ 13->65 dropped 109 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->109 111 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 13->111 113 Tries to harvest and steal browser information (history, passwords, etc) 13->113 115 Tries to steal Crypto Currency Wallets 13->115 24 Temptw21one_build.exe 1 2 13->24         started        file7 signatures8 process9 file10 63 C:\Users\user\AppData\Roaming\...\RegHost.exe, PE32+ 24->63 dropped 93 Query firmware table information (likely to detect VMs) 24->93 95 Injects code into the Windows Explorer (explorer.exe) 24->95 97 Writes to foreign memory regions 24->97 99 4 other signatures 24->99 28 explorer.exe 2 24->28         started        30 curl.exe 1 24->30         started        33 bfsvc.exe 1 24->33         started        35 conhost.exe 24->35         started        signatures11 process12 dnsIp13 37 RegHost.exe 28->37         started        40 curl.exe 28->40         started        43 curl.exe 28->43         started        49 8 other processes 28->49 75 api.telegram.org 149.154.167.220, 443, 49804 TELEGRAMRU United Kingdom 30->75 45 conhost.exe 30->45         started        47 conhost.exe 33->47         started        process14 dnsIp15 85 Query firmware table information (likely to detect VMs) 37->85 87 Tries to detect sandboxes and other dynamic analysis tools (window names) 37->87 89 Modifies the context of a thread in another process (thread injection) 37->89 91 2 other signatures 37->91 67 185.137.234.33, 49808, 49811, 49812 SELECTELRU Russian Federation 40->67 51 conhost.exe 40->51         started        53 conhost.exe 43->53         started        55 conhost.exe 49->55         started        57 conhost.exe 49->57         started        59 conhost.exe 49->59         started        61 4 other processes 49->61 signatures16 process17
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2022-01-17 14:57:29 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
persistence
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Sets service image path in registry
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
2fd64b57263893def6dbfa1f4c3ff5a9d8401af088e784849dab1dacf5d52afc
MD5 hash:
6b22f2cf577dbc4125e251d18649b178
SHA1 hash:
37590f74cf8a7ec465c32737a0380fa062a4446b
SH256 hash:
2806b3e2aeb583cdd693ca9a024ea63222ee2c4582d66d95126635965ba919b2
MD5 hash:
a7859e380614970e688306a9d9762f3e
SHA1 hash:
3b9c529978e5b9293d9953bfc0766a2feecbc63b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments