MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 30afeeb95ae261026f5e0a300b4fa3b7a08a920cd7b0372cbc25cfb1abee4c04. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments 1

SHA256 hash: 30afeeb95ae261026f5e0a300b4fa3b7a08a920cd7b0372cbc25cfb1abee4c04
SHA3-384 hash: 3f0b07f2cb887aac267be063d88b25f06792208311890a33a30d0a8c4d4c32ac1c72ddae5816845e965d38f33e74481d
SHA1 hash: d0885a59b727387a1556786b651d61a2a51205bd
MD5 hash: f04df7f852cac1d70c7e8a5b746c2d81
humanhash: beer-hawaii-six-vegan
File name:f04df7f852cac1d70c7e8a5b746c2d81
Download: download sample
Signature RedLineStealer
File size:628'616 bytes
First seen:2021-10-02 01:56:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 26b2a22c1afb78875d9384441bc03abe (4 x ArkeiStealer, 4 x RedLineStealer, 2 x Stop)
ssdeep 12288:IIX3tuleNO+dRmlp2N/rYX2lkNedrAfO3KlPK3XlPDAM:II0leNtRap2N/r9rupE/
Threatray 9 similar samples on MalwareBazaar
TLSH T186D42311E8128835D34182334919C6D7FE3EBC73BF9166EBB6401B5D5F35292AA3632B
File icon (PE):PE icon
dhash icon 4839b234e8c38890 (121 x RaccoonStealer, 54 x RedLineStealer, 51 x ArkeiStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
615710_IDM-Crack-639-B.zip
Verdict:
Malicious activity
Analysis date:
2021-10-01 14:28:23 UTC
Tags:
trojan rat redline loader evasion stealer opendir amadey vidar

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Replacing files
Launching a process
Creating a window
Connection attempt
Searching for the window
Using the Windows Management Instrumentation requests
Forced shutdown of a browser
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.adwa.evad
Score:
72 / 100
Signature
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Modifies the hosts file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Self deletion via cmd delete
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 495396 Sample: nGzDRX7N0t Startdate: 02/10/2021 Architecture: WINDOWS Score: 72 53 Multi AV Scanner detection for submitted file 2->53 55 Machine Learning detection for sample 2->55 7 nGzDRX7N0t.exe 16 4 2->7         started        process3 dnsIp4 45 p6701.softemstore.xyz 104.21.10.13, 443, 49756 CLOUDFLARENETUS United States 7->45 31 C:\Windows\System32\drivers\etc\hosts, ASCII 7->31 dropped 33 C:\Users\user\AppData\...\nGzDRX7N0t.exe.log, ASCII 7->33 dropped 57 Detected unpacking (overwrites its own PE header) 7->57 59 Performs DNS queries to domains with low reputation 7->59 61 Self deletion via cmd delete 7->61 63 Modifies the hosts file 7->63 12 chrome.exe 10 71 7->12         started        16 cmd.exe 1 7->16         started        18 cmd.exe 1 7->18         started        file5 signatures6 process7 dnsIp8 47 192.168.2.1 unknown unknown 12->47 49 192.168.2.30 unknown unknown 12->49 51 239.255.255.250 unknown Reserved 12->51 35 C:\Users\user\...\the-real-indexd (copy), PDP-11 12->35 dropped 37 C:\Users\user\AppData\Local\...\temp-index, PDP-11 12->37 dropped 20 chrome.exe 15 12->20         started        23 taskkill.exe 1 16->23         started        25 conhost.exe 16->25         started        27 taskkill.exe 1 18->27         started        29 conhost.exe 18->29         started        file9 process10 dnsIp11 39 gstaticadssl.l.google.com 142.250.203.99, 443, 49766 GOOGLEUS United States 20->39 41 www.google.com 172.217.168.36, 443, 49757, 49760 GOOGLEUS United States 20->41 43 3 other IPs or domains 20->43
Threat name:
Win32.Trojan.Racealer
Status:
Malicious
First seen:
2021-09-27 17:23:38 UTC
AV detection:
40 of 45 (88.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Checks processor information in registry
Enumerates system info in registry
Kills process with taskkill
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Deletes itself
Reads user/profile data of web browsers
Drops file in Drivers directory
Unpacked files
SH256 hash:
62701fe365cc2644d88d36574b663b8ea69ee4ca7c50450069e0c4b9007fa12d
MD5 hash:
a9be257eb251faa39ef792cef986416e
SHA1 hash:
cdc8c26025242d5fe94f1d6c19ee8d7beb364d2f
SH256 hash:
5fbdaa6942b8c31cac996e309a8de8a545618d986e49f3dd208804b0b4d9c6a0
MD5 hash:
e58b6b47395d12f7be5b5859b128a13a
SHA1 hash:
9b365a89b85a4306acff247f1138408e9d5b3371
SH256 hash:
c9761860c27baae19ae977efe9d1d2eb9c3279e792f05045b51046dd2dc3ffb7
MD5 hash:
9e761803fc99198716323f0ac9681a8d
SHA1 hash:
90dc44363ad873777e1d9c37e3c76b52688878d8
SH256 hash:
da29c870d9ae1c5c3ab4e13277478e231412a8156d51b46635d32eb2197caf76
MD5 hash:
629f5017a6e8067cb621fa0167f9eef9
SHA1 hash:
5f4503ee9cef9675b25295842fda111b8ef3c5af
SH256 hash:
c6a916056f26260b2eafd02e28372b3c17be0684144319ca850317cc9c71584e
MD5 hash:
268382ed587ff070a0a25765cc1cb2ea
SHA1 hash:
3f8290ac279405185e7d1e105362bd28de8dfeb6
SH256 hash:
30afeeb95ae261026f5e0a300b4fa3b7a08a920cd7b0372cbc25cfb1abee4c04
MD5 hash:
f04df7f852cac1d70c7e8a5b746c2d81
SHA1 hash:
d0885a59b727387a1556786b651d61a2a51205bd
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 30afeeb95ae261026f5e0a300b4fa3b7a08a920cd7b0372cbc25cfb1abee4c04

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-10-02 01:56:16 UTC

url : hxxp://2.56.59.42/EU/UnpackChrome2009.exe