MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a3650fe227cd9e83c05b6e009ce3e4a1504244ed5871cc3fe6a2183e085386a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: 2a3650fe227cd9e83c05b6e009ce3e4a1504244ed5871cc3fe6a2183e085386a
SHA3-384 hash: f982041f6e1b860e95ddead2e633f84e79c1a816fd49a75ba55b2e2a859587dd51e4b7d6cbe2874e6b98406f7422c55e
SHA1 hash: 23da3e203279e4c559febc41b302619be4e40c48
MD5 hash: 37ea12a8b28a3ee9f005e35d3b1adf57
humanhash: texas-tennis-winner-alabama
File name:37EA12A8B28A3EE9F005E35D3B1ADF57.exe
Download: download sample
Signature RedLineStealer
File size:1'049'671 bytes
First seen:2021-06-21 20:31:36 UTC
Last seen:2021-06-21 21:43:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 650ed02ca4b6baad6b24f20402b6268b (7 x RedLineStealer, 1 x CryptBot, 1 x RemcosRAT)
ssdeep 24576:r5REvpedfR/V2v5007snDhjPdOjUA+bYHtBdkV08grM7lKL:rARed5cR00ANJ1mx60u7i
Threatray 279 similar samples on MalwareBazaar
TLSH 642501CD37A1B7B9D15E78F04B75A7A305225EAD0F93C9832788FB06FF2C1848269255
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.170.213.107:42592

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.170.213.107:42592 https://threatfox.abuse.ch/ioc/139039/

Intelligence


File Origin
# of uploads :
2
# of downloads :
146
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
37EA12A8B28A3EE9F005E35D3B1ADF57.exe
Verdict:
Malicious activity
Analysis date:
2021-06-21 20:32:23 UTC
Tags:
autoit trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
92 / 100
Signature
Contains functionality to register a low level keyboard hook
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Obfuscated command line found
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 438012 Sample: LKpLx8L8q9.exe Startdate: 21/06/2021 Architecture: WINDOWS Score: 92 41 api.ip.sb 2->41 55 Found malware configuration 2->55 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected RedLine Stealer 2->59 61 Machine Learning detection for sample 2->61 11 LKpLx8L8q9.exe 7 2->11         started        signatures3 process4 signatures5 63 Contains functionality to register a low level keyboard hook 11->63 14 cmd.exe 1 11->14         started        process6 signatures7 65 Submitted sample is a known malware sample 14->65 67 Obfuscated command line found 14->67 69 Uses ping.exe to sleep 14->69 71 Uses ping.exe to check the status of other devices and networks 14->71 17 cmd.exe 3 14->17         started        20 conhost.exe 14->20         started        process8 signatures9 51 Obfuscated command line found 17->51 53 Uses ping.exe to sleep 17->53 22 Rugiada.exe.com 17->22         started        24 PING.EXE 1 17->24         started        27 findstr.exe 1 17->27         started        process10 dnsIp11 30 Rugiada.exe.com 1 22->30         started        43 127.0.0.1 unknown unknown 24->43 37 C:\Users\user\AppData\...\Rugiada.exe.com, Targa 27->37 dropped file12 process13 dnsIp14 45 VbAOQNrKNFoNGDfSPlVTPb.VbAOQNrKNFoNGDfSPlVTPb 30->45 39 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 30->39 dropped 47 Writes to foreign memory regions 30->47 49 Injects a PE file into a foreign processes 30->49 35 RegAsm.exe 2 30->35         started        file15 signatures16 process17
Threat name:
Win32.Trojan.Graftor
Status:
Malicious
First seen:
2021-06-21 20:32:12 UTC
AV detection:
15 of 46 (32.61%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Unpacked files
SH256 hash:
3f184a01c58f435e244621a20d7b0389df0da506b442961c14d785aafe06df88
MD5 hash:
acea5f3c84a1a0ef83c40f5b909db176
SHA1 hash:
2f02e5307d03aca0349ba0c2023d11dc7b1c6e7b
SH256 hash:
190e34457374b8d431bc7d265f7b698a316bd57c1b92ecb83ea2b27063d90862
MD5 hash:
d622ac0638ff4a9740293a099d930de2
SHA1 hash:
6a2203a98acfdc604484a4e8c0bdf5cf312430b5
SH256 hash:
2a3650fe227cd9e83c05b6e009ce3e4a1504244ed5871cc3fe6a2183e085386a
MD5 hash:
37ea12a8b28a3ee9f005e35d3b1adf57
SHA1 hash:
23da3e203279e4c559febc41b302619be4e40c48
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments