MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 42726a2132dea4cd8406a0face18551317f74eac29f8e0f8aec8a15fd26cd635. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 2 File information Comments 1

SHA256 hash: 42726a2132dea4cd8406a0face18551317f74eac29f8e0f8aec8a15fd26cd635
SHA3-384 hash: 227b74e752d922d02788de9f29b116e8ed0c09785d24c34ebd9e884f0d91f884bdc214dd3b21116e5ba6352c5aabcb7a
SHA1 hash: 8fd0af3391a078d689246377116a8ba4b0f4a686
MD5 hash: e4041f6b56f96cf32e6c435b848b45b1
humanhash: zebra-fix-snake-sierra
File name:e4041f6b56f96cf32e6c435b848b45b1
Download: download sample
Signature RedLineStealer
File size:353'792 bytes
First seen:2022-03-14 17:01:31 UTC
Last seen:2022-03-14 18:39:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e577f59876ba8a79d67abbaf24862df1 (1 x RedLineStealer)
ssdeep 6144:/3BHxr8893WzmfCYMtF1+4dbeOL9gK7jyGqTRaOHZIt6L5qsI:/3BH51re+49zL9jGPIvI
Threatray 1'972 similar samples on MalwareBazaar
TLSH T1EF749D56F79528FCD46BC17082A20912BA723C994B21AFEF379852352E377E05E3DB50
Reporter zbetcheckin
Tags:exe RedLineStealer

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
89.223.125.80:6621 https://threatfox.abuse.ch/ioc/395223/

Intelligence


File Origin
# of uploads :
2
# of downloads :
183
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Launching a process
Creating a file
Reading critical registry keys
Sending an HTTP POST request
Changing a file
Creating a file in the %AppData% subdirectories
DNS request
Creating a file in the %temp% directory
Query of malicious DNS domain
Stealing user critical data
Sending a TCP request to an infection source
Unauthorized injection to a system process
Sending an HTTP GET request to an infection source
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
DLL side loading technique detected
Found C&C like URL pattern
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after checking mutex)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Protects its processes via BreakOnTermination flag
Sigma detected: Silenttrinity Stager Msbuild Activity
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win64.Hacktool.Wovdnut
Status:
Malicious
First seen:
2022-03-09 03:23:32 UTC
File Type:
PE+ (Exe)
AV detection:
22 of 42 (52.38%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious use of AdjustPrivilegeToken
Unpacked files
SH256 hash:
42726a2132dea4cd8406a0face18551317f74eac29f8e0f8aec8a15fd26cd635
MD5 hash:
e4041f6b56f96cf32e6c435b848b45b1
SHA1 hash:
8fd0af3391a078d689246377116a8ba4b0f4a686
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Emotet
Author:Dhanunjaya
Description:Yara Rule To Detect Emotet
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 42726a2132dea4cd8406a0face18551317f74eac29f8e0f8aec8a15fd26cd635

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-03-14 17:01:33 UTC

url : hxxp://45.144.225.57/USA/pestilence470us.exe