MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 38a2144651bd3980612f92a1cd2308adf10dd630d618ee05232bf1a8cf76444c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments 1

SHA256 hash: 38a2144651bd3980612f92a1cd2308adf10dd630d618ee05232bf1a8cf76444c
SHA3-384 hash: fea3cb470d8aebe29b93db9b0b3ae0cd91307d60fd39603f6c45e66e8d82a1f7730d4b54a168724cb98b72babdb8dcf1
SHA1 hash: 3feeecddefc6ccbc0bc1fb5c4681f67ab9492941
MD5 hash: 2dc2cc62324f0a85be0b86c437411c96
humanhash: nitrogen-early-enemy-timing
File name:2dc2cc62324f0a85be0b86c437411c96
Download: download sample
Signature RedLineStealer
File size:506'880 bytes
First seen:2021-12-21 10:35:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f6af73011d9ad7cbccf66eb190442910 (42 x RedLineStealer, 8 x RaccoonStealer, 1 x Smoke Loader)
ssdeep 12288:sv4kmboE/rjT7AKQS03ULaHNqrxlKIQNof3laLY9lzXdLcGvl:sLrE/rHEKkEaHNYK3w3lAwdQGN
Threatray 822 similar samples on MalwareBazaar
TLSH T142B423B323DAC62AC1D511BC51A3BE5FA3A452A4C189764DFAEF59066D0C89BF70C4CC
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
205
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2dc2cc62324f0a85be0b86c437411c96
Verdict:
Malicious activity
Analysis date:
2021-12-21 10:38:34 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Searching for the window
Using the Windows Management Instrumentation requests
DNS request
Creating a window
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Drops PE files with benign system names
Found malware configuration
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: System File Execution Location Anomaly
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 543355 Sample: 0jOfzub138 Startdate: 21/12/2021 Architecture: WINDOWS Score: 100 68 Found malware configuration 2->68 70 Malicious sample detected (through community Yara rule) 2->70 72 Multi AV Scanner detection for submitted file 2->72 74 7 other signatures 2->74 10 0jOfzub138.exe 2->10         started        13 explorer.exe 2->13         started        15 sihost64.exe 2 2->15         started        process3 signatures4 90 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 10->90 92 Writes to foreign memory regions 10->92 94 Allocates memory in foreign processes 10->94 96 Injects a PE file into a foreign processes 10->96 17 AppLaunch.exe 15 7 10->17         started        22 WerFault.exe 23 9 10->22         started        98 System process connects to network (likely due to code injection or exploit) 13->98 100 Query firmware table information (likely to detect VMs) 13->100 process5 dnsIp6 52 62.182.156.182, 21588, 49764 AutonomousSystemofBaunetworks-SerbiaRS Russian Federation 17->52 54 bitbucket.org 104.192.141.1, 443, 49767 AMAZON-02US United States 17->54 46 C:\Users\user\AppData\...\last_update.exe, PE32+ 17->46 dropped 76 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 17->76 78 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 17->78 80 Tries to harvest and steal browser information (history, passwords, etc) 17->80 82 Tries to steal Crypto Currency Wallets 17->82 24 last_update.exe 4 17->24         started        48 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 22->48 dropped file7 signatures8 process9 file10 50 C:\Users\user\AppData\...\services.exe, PE32+ 24->50 dropped 84 Multi AV Scanner detection for dropped file 24->84 86 Machine Learning detection for dropped file 24->86 88 Drops PE files with benign system names 24->88 28 cmd.exe 1 24->28         started        30 cmd.exe 1 24->30         started        signatures11 process12 signatures13 33 services.exe 3 28->33         started        36 conhost.exe 28->36         started        104 Uses schtasks.exe or at.exe to add and modify task schedules 30->104 38 conhost.exe 30->38         started        40 schtasks.exe 1 30->40         started        process14 signatures15 60 Multi AV Scanner detection for dropped file 33->60 62 Machine Learning detection for dropped file 33->62 64 Injects code into the Windows Explorer (explorer.exe) 33->64 66 4 other signatures 33->66 42 explorer.exe 33->42         started        process16 dnsIp17 56 146.59.188.176, 3333 OVHFR Norway 42->56 58 192.168.2.1 unknown unknown 42->58 102 Query firmware table information (likely to detect VMs) 42->102 signatures18
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-12-21 10:13:50 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 27 (81.48%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Unpacked files
SH256 hash:
beea936452ba9489ef3e20f43c35dcfd836153feb882d6e3174c8d2ac259ce06
MD5 hash:
7db0cea37a5ca5d645a8eafd92b394b0
SHA1 hash:
475f9a0b9c23702e292813192cc5eb3fef1677a2
SH256 hash:
ead747d4f985b03cdbc9a64dc38436a68b3f55815ad3359d11471bacfa2c8d2e
MD5 hash:
795fd6c9573f841c6ee6edd732c16552
SHA1 hash:
7aea6735f88a83bbc2471b79c2363d36fd64a132
SH256 hash:
38a2144651bd3980612f92a1cd2308adf10dd630d618ee05232bf1a8cf76444c
MD5 hash:
2dc2cc62324f0a85be0b86c437411c96
SHA1 hash:
3feeecddefc6ccbc0bc1fb5c4681f67ab9492941
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 38a2144651bd3980612f92a1cd2308adf10dd630d618ee05232bf1a8cf76444c

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-21 10:35:17 UTC

url : hxxp://212.193.30.29/WW/file3.exe