MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 29372ef20086423e80fecb84a9ad7980f781433772c6d05f3134037ab819badc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 1 File information Comments

SHA256 hash: 29372ef20086423e80fecb84a9ad7980f781433772c6d05f3134037ab819badc
SHA3-384 hash: 2b15cb77553343bfb758970d43ef283c3af8f3f34ec7fe95ce21cb5e5d339cc9f5ffd6eed986e958a45032ea43b900e2
SHA1 hash: 56332c906d54312d99e71c649cbd7fe1e0639c83
MD5 hash: 669a5b5d993f472a4ab68e4405649fde
humanhash: east-social-echo-robin
File name:flash.exe
Download: download sample
Signature RedLineStealer
File size:461'312 bytes
First seen:2022-06-24 10:27:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash bf5a4aa99e5b160f8521cadd6bfe73b8 (432 x RedLineStealer, 31 x AgentTesla, 12 x DCRat)
ssdeep 12288:Ih1Lk70TnvjcbqPOdpMFgclmThae2zsWFBjlSc+n:Uk70Trce2d4JKUsWLlP6
TLSH T1C0A4F12135C0C2B3D47B103048EACF799F7971615B2A96E3B79D17BA1E112E1A33A1CE
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter obfusor
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
211
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Running batch commands
Creating a process with a hidden window
Creating a file in the %AppData% directory
Creating a file in the %temp% directory
Creating a file
Launching a process
Creating a process from a recently created file
DNS request
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
EnumerateProcesses
CPUID_Instruction
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
AsyncRAT, DcRat, RedLine
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected AsyncRAT
Yara detected DcRat
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 651764 Sample: flash.exe Startdate: 24/06/2022 Architecture: WINDOWS Score: 100 34 info.ctxcel.com 2->34 38 Malicious sample detected (through community Yara rule) 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 Yara detected DcRat 2->42 44 5 other signatures 2->44 8 flash.exe 9 2->8         started        11 server.exe 5 2->11         started        signatures3 process4 file5 30 C:\Users\user\AppData\Roaming\server.exe, PE32 8->30 dropped 32 C:\Users\user\AppData\Local\...\flash.exe.log, ASCII 8->32 dropped 14 cmd.exe 1 8->14         started        17 cmd.exe 1 8->17         started        46 Multi AV Scanner detection for dropped file 11->46 48 Machine Learning detection for dropped file 11->48 signatures6 process7 signatures8 50 Uses schtasks.exe or at.exe to add and modify task schedules 14->50 19 conhost.exe 14->19         started        21 schtasks.exe 1 14->21         started        23 server.exe 4 17->23         started        26 conhost.exe 17->26         started        28 timeout.exe 1 17->28         started        process9 dnsIp10 36 info.ctxcel.com 107.148.13.247, 443, 49770, 49783 PEGTECHINCUS United States 23->36
Threat name:
Win32.Backdoor.Crysan
Status:
Malicious
First seen:
2022-06-24 10:03:17 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
asyncrat
Result
Malware family:
asyncrat
Score:
  10/10
Tags:
family:asyncrat botnet:default rat
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Loads dropped DLL
Executes dropped EXE
Async RAT payload
AsyncRat
Malware Config
C2 Extraction:
info.ctxcel.com:443
Unpacked files
SH256 hash:
cd27e375aefcfe72ae141afcd9cdfdf87c328a6098d07183294f1fa88ebaf4c7
MD5 hash:
389a1257fd9060cfc5c21e01eab819e9
SHA1 hash:
790cd9c827eb8a0bfcb278e607b73f445e3ae548
SH256 hash:
8ba172cf974f95448b1b62e247638402184e51cb934ecfa0ea9925f129f638ba
MD5 hash:
ec3090673871cd86678bd0cd71cba2e1
SHA1 hash:
5788926402d2f67ee7583fb94e0b4cea31fdcdb2
SH256 hash:
53e39547cba9b73aa3561e6f3f0b8387d118dc29a6fd75d137cd64bbdd955f0f
MD5 hash:
8506991e92e7070270f1b2c9a7b276d1
SHA1 hash:
06fa14645995f562a1176e21e3293acf4975409d
Detections:
VenomRat
SH256 hash:
29372ef20086423e80fecb84a9ad7980f781433772c6d05f3134037ab819badc
MD5 hash:
669a5b5d993f472a4ab68e4405649fde
SHA1 hash:
56332c906d54312d99e71c649cbd7fe1e0639c83
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments