MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3c820da115d083116a24d73cc715283f26b5f4cae406e79e8faf088c682a172e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA File information Comments

SHA256 hash: 3c820da115d083116a24d73cc715283f26b5f4cae406e79e8faf088c682a172e
SHA3-384 hash: 003ad8a1e0d36039f8057844044928f6f1ed2fee7062064f3d39759032cae54419303b452713619e00d70ce446a7ae90
SHA1 hash: 92d6b531fe53ade80117c64f8ee00b5af7f6fccc
MD5 hash: 9316a1a1708a94afb38126b5e24b3c1a
humanhash: finch-hydrogen-early-three
File name:3c820da115d083116a24d73cc715283f26b5f4cae406e.exe
Download: download sample
Signature RedLineStealer
File size:1'314'648 bytes
First seen:2021-12-14 14:47:44 UTC
Last seen:2021-12-14 17:05:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 15aeac4aa1d11f9ad3fc4c4ac7bb9468 (58 x RedLineStealer, 5 x RaccoonStealer, 3 x CoinMiner)
ssdeep 24576:ocQinxhCG8x9UDwfihVzQQQE215wrTc/5UeWWhDKvAAUkEaHNYK379vHF:Yin38x9UDwfwQ15wrARUedAvAAUNarvF
TLSH T18A5533EBE318B19EF240277C5680D676C1BAD371AC8EB7C83A6AED84404437DE61E15D
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.206.213.148:43383

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.206.213.148:43383 https://threatfox.abuse.ch/ioc/275640/

Intelligence


File Origin
# of uploads :
2
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3c820da115d083116a24d73cc715283f26b5f4cae406e.exe
Verdict:
Malicious activity
Analysis date:
2021-12-14 14:51:52 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Searching for the window
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  0/10
Tags:
n/a
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Reline
Status:
Malicious
First seen:
2021-12-14 14:48:13 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline evasion infostealer spyware trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Checks BIOS information in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
185.206.213.148:43383
Unpacked files
SH256 hash:
ed9ec15a7d0de786f7734bd7b7c65fd93b4a843710c561efe055f5093129f55f
MD5 hash:
c0bf2c0bc815fc2e9f7b07635dec0cb3
SHA1 hash:
491a939f13f52713a79babee5d7efbda952600d8
SH256 hash:
3c820da115d083116a24d73cc715283f26b5f4cae406e79e8faf088c682a172e
MD5 hash:
9316a1a1708a94afb38126b5e24b3c1a
SHA1 hash:
92d6b531fe53ade80117c64f8ee00b5af7f6fccc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments