MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3ef2031bfa11d5d3185989e60d8ff3568231c78628ff6bb851ae135d222a88a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 1 File information Comments

SHA256 hash: 3ef2031bfa11d5d3185989e60d8ff3568231c78628ff6bb851ae135d222a88a1
SHA3-384 hash: 1a0cfe1ce4c7b862ccdff521ef8953938c07035178e101511c236816b8f5a9684e34c303b4bb9f150908efd206c39b04
SHA1 hash: bbc5ecbe78040246bf45fb0ddc800920e3027236
MD5 hash: 1588eeed112f7a75a0f7dfe628480302
humanhash: echo-arkansas-winner-mockingbird
File name:3ef2031bfa11d5d3185989e60d8ff3568231c78628ff6.exe
Download: download sample
Signature RedLineStealer
File size:434'688 bytes
First seen:2021-06-23 14:35:51 UTC
Last seen:2021-06-23 15:44:22 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c5f88ba6771d8ff33e7b31b259b694f4 (1 x RedLineStealer, 1 x Formbook)
ssdeep 12288:2gOcG3C7vaCBvFRuHwTM5tLLf8pSrvioRe:2eG3C7vFvWr5tLLMWxe
Threatray 2'789 similar samples on MalwareBazaar
TLSH EF949D10A6A0C035F1F756F89A76D3ADA52E7D615B2050CF22E5EAEE06347E1EC3131B
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.215.113.50:43919

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.50:43919 https://threatfox.abuse.ch/ioc/150120/

Intelligence


File Origin
# of uploads :
2
# of downloads :
125
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3ef2031bfa11d5d3185989e60d8ff3568231c78628ff6.exe
Verdict:
Malicious activity
Analysis date:
2021-06-23 14:40:29 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2021-06-23 14:36:19 UTC
AV detection:
20 of 29 (68.97%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
BzETRSkOAx06J1EcBzE5ASswC1M6MChRBzEfSQ==
Unpacked files
SH256 hash:
6e9c04cc26e7a5f49005e80a711281f4f8ea79c046217aa1d08110c00c13730b
MD5 hash:
3876eac9f607f235703e5d5fe1e1f468
SHA1 hash:
757c9e609bf4609ced7a6f633d1c564cb59f1b49
SH256 hash:
0bf73608af671effd0151acc6293c66d469878b618d420ce19433efa279a358c
MD5 hash:
8dd54020eb70d4a4d9c059b60c8742e8
SHA1 hash:
4ed7461e6c84472d157015e2da3fd00c7bf62b58
SH256 hash:
13429c9c88e5f8561e5e17c8170a60f5a5cb623653136243608a7cfff026278c
MD5 hash:
0fe44b6fd48d7d9889bdb06fc6935918
SHA1 hash:
1df7f6393b4a04865d88bfeafeb4d75c032e7ed3
SH256 hash:
3ef2031bfa11d5d3185989e60d8ff3568231c78628ff6bb851ae135d222a88a1
MD5 hash:
1588eeed112f7a75a0f7dfe628480302
SHA1 hash:
bbc5ecbe78040246bf45fb0ddc800920e3027236
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments