MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2a3ef660bc5ddec834f1f6473e07d4a2581dd0139d6f84742a1c2e9b5fd4561b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 2 File information Comments

SHA256 hash: 2a3ef660bc5ddec834f1f6473e07d4a2581dd0139d6f84742a1c2e9b5fd4561b
SHA3-384 hash: cacf00b9de597caccb81b86c8ff84f097033eae548ad60986236f38ba9f3c416a5f3b118c9e0bf61ace2aae05fe884b8
SHA1 hash: 20481b01f8dfe734b5fd632d08bcf3a0f147631d
MD5 hash: 97facad2667f8dc2598a035c6bdbb36a
humanhash: lake-eight-mars-finch
File name:567XlsInvoice.exe
Download: download sample
Signature RedLineStealer
File size:755'712 bytes
First seen:2022-04-20 01:20:48 UTC
Last seen:2022-04-20 01:36:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:k4bwhqI2URdXcA+s+UOCIr8fY9bk6Tpx9VKTUWBrVxqp9HLfiYY/iMzfTBZZyP:dwhAUjys+1CIr8g5kElsT9sLfiYBMzf0
Threatray 3'865 similar samples on MalwareBazaar
TLSH T197F42230A2EA2333CA39ABF9452351855BF0E33AE472E6885DC5B5CA4427B514F60FD7
TrID 72.5% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.4% (.EXE) Win64 Executable (generic) (10523/12/4)
6.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.4% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 70c0d0d0c8ccf0f0 (8 x Formbook, 4 x NanoCore, 3 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
140.228.29.199:25415

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
140.228.29.199:25415 https://threatfox.abuse.ch/ioc/521884/

Intelligence


File Origin
# of uploads :
2
# of downloads :
281
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected AntiVM3
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-04-19 19:18:42 UTC
File Type:
PE (.Net Exe)
Extracted files:
10
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:viewoffer discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
140.228.29.199:25415
Unpacked files
SH256 hash:
334b7f600ceb9594c653bf17226e8b81af8df7fd864a92d231d1b2f91ff31b3a
MD5 hash:
f1f0f81f557e6d382104d6fba5f60f40
SHA1 hash:
eb8d26f15af6951353ba6379ebf1fed08515c5ef
SH256 hash:
c86c33a2b695ac13f08c107137d28545b32109265a1e2c1eac0b37b01ed3a5dc
MD5 hash:
5d6aaceb30a689a063f0620d4cfd8d07
SHA1 hash:
da1c1a5569078f6ba4256ab6026a8d3599b2a3fb
SH256 hash:
b6d8f13ef26574589f05993310357eb2f3d07c15bc062ace7f348c9d70a94901
MD5 hash:
5697910b700063cab5a88c0379a3625f
SHA1 hash:
ffd11b1362c5d89c04e7e88aab8e7cd6f56c82f8
SH256 hash:
7172472f86ff1ff133d5c8ba5bad21ecad8457bf416a5f54e95bee9606639e7d
MD5 hash:
e70ed9e06e6161eebd8c96f36e7b50fa
SHA1 hash:
1789866b0f4ba135471a28d8eaea75151b1bb2c8
SH256 hash:
2a3ef660bc5ddec834f1f6473e07d4a2581dd0139d6f84742a1c2e9b5fd4561b
MD5 hash:
97facad2667f8dc2598a035c6bdbb36a
SHA1 hash:
20481b01f8dfe734b5fd632d08bcf3a0f147631d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments