MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45999399ac27862881a6e4e666b9b1cda8469f975fd9f19833ce30876752d2b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 45999399ac27862881a6e4e666b9b1cda8469f975fd9f19833ce30876752d2b7
SHA3-384 hash: c883377aebfe16ee052059b15b4f010d2d18103361f72a385fd9c2d51a9094a5f0c4328ad095965661383d55a20f3bcb
SHA1 hash: fb990324ea0482cbad5a473984aa778a8854f2f8
MD5 hash: 4611905e79011cdb6ce55e6f7b4cd421
humanhash: whiskey-massachusetts-arkansas-bravo
File name:4611905e79011cdb6ce55e6f7b4cd421.exe
Download: download sample
Signature RedLineStealer
File size:259'072 bytes
First seen:2021-09-25 17:23:25 UTC
Last seen:2021-09-25 18:11:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 062d438af0a5427d47d2119e831026d3 (27 x RedLineStealer, 8 x RaccoonStealer, 4 x ArkeiStealer)
ssdeep 6144:Mn5zkEMzDieXPOm5riqbPYVYOU64QoEad:u5zvMvieXPjnbPYV9U64Dd
Threatray 6'498 similar samples on MalwareBazaar
TLSH T12B44D02176B3C035D3F7453569348394A63BBF225E73814BF64D2B6F6E322816AE2346
File icon (PE):PE icon
dhash icon fcfcd4f4d4dcd8c0 (34 x RaccoonStealer, 21 x RedLineStealer, 8 x ArkeiStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.9.20.20:13441

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.9.20.20:13441 https://threatfox.abuse.ch/ioc/226443/

Intelligence


File Origin
# of uploads :
2
# of downloads :
150
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4611905e79011cdb6ce55e6f7b4cd421.exe
Verdict:
Malicious activity
Analysis date:
2021-09-25 17:26:31 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a service
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Connection attempt to an infection source
Sending a TCP request to an infection source
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.DllCheck
Status:
Malicious
First seen:
2021-09-25 14:23:23 UTC
AV detection:
15 of 45 (33.33%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:pub discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
45.9.20.20:13441
Unpacked files
SH256 hash:
7de1f501c6f4edfbb3e61dda5d445b4482235420e19cd3e193ae3be26d374367
MD5 hash:
858ebd87027f4c3adcb5e2c59ec5161c
SHA1 hash:
f758ceef9690fb7430c910fcffd71c0cdb456834
SH256 hash:
541526a7b80a64b50c770517545d25c0515a146c3ddc5600a65d91cfdaf5e3a0
MD5 hash:
d964fece1f6eade1b3b0ab1ca479d7e1
SHA1 hash:
cf6948b22255272da7d81e38a936ee90b95c17ee
SH256 hash:
4e04bba712969aa15782d796bd66233e30de2ceb2fd6f23f8ec88b64b4857636
MD5 hash:
26e6a498e6fdb35574c6a6e51e0b7d1c
SHA1 hash:
394bd2b1362a1fe2fb96cc69971fa08c43bcbf14
SH256 hash:
45999399ac27862881a6e4e666b9b1cda8469f975fd9f19833ce30876752d2b7
MD5 hash:
4611905e79011cdb6ce55e6f7b4cd421
SHA1 hash:
fb990324ea0482cbad5a473984aa778a8854f2f8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 45999399ac27862881a6e4e666b9b1cda8469f975fd9f19833ce30876752d2b7

(this sample)

  
Delivery method
Distributed via web download

Comments