MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 45b76fce339fdd9b0737679a358b178ccae8bbf860789d937eba2e77e247ae78. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 45b76fce339fdd9b0737679a358b178ccae8bbf860789d937eba2e77e247ae78
SHA3-384 hash: 0b3181f28e272f2d6be8e480707337c621a81545b4dd8f1f7d4344d65e6249b51f1b5da8140199699c6236e8cb83cf3f
SHA1 hash: a4c4a4f58ba02a6c749ae0f763cc8ef1bd98434e
MD5 hash: 7febd1d3c2350eb770678b717b3b3f44
humanhash: river-uranus-lemon-video
File name:GU.exe
Download: download sample
Signature RedLineStealer
File size:458'752 bytes
First seen:2022-09-10 11:24:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7f55fc0481fe939f858f6e3c9baf7b16 (12 x RedLineStealer, 1 x ArkeiStealer)
ssdeep 12288:2T8kslXZ0fXt75QqsFq0rUd9SEJFjk3xt:2T8kYXZ0f7QhFqZUw6x
Threatray 2'791 similar samples on MalwareBazaar
TLSH T1D6A49D01B9B2C0B3D5639AB1D87DC32D217A7A201B214DEB6FC019B86EE47D15A70F67
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter r3dbU7z
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
524
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
GU.exe
Verdict:
Malicious activity
Analysis date:
2022-09-10 11:24:51 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a window
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
DCRat, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Allocates memory in foreign processes
Antivirus detection for URL or domain
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Writes to foreign memory regions
Yara detected DCRat
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 700722 Sample: GU.exe Startdate: 10/09/2022 Architecture: WINDOWS Score: 100 47 Snort IDS alert for network traffic 2->47 49 Multi AV Scanner detection for domain / URL 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 9 other signatures 2->53 8 GU.exe 1 2->8         started        process3 signatures4 63 Contains functionality to inject code into remote processes 8->63 65 Writes to foreign memory regions 8->65 67 Allocates memory in foreign processes 8->67 69 Injects a PE file into a foreign processes 8->69 11 AppLaunch.exe 15 5 8->11         started        16 WerFault.exe 23 9 8->16         started        18 conhost.exe 8->18         started        20 WerFault.exe 8->20         started        process5 dnsIp6 41 185.106.92.8, 38644, 49745 SUPERSERVERSDATACENTERRU Russian Federation 11->41 43 siasky.net 94.102.51.19, 443, 49726 INT-NETWORKSC Netherlands 11->43 45 pastebin.com 104.20.67.143, 443, 49725, 49731 CLOUDFLARENETUS United States 11->45 35 C:\Users\user\AppData\Local\Temp\module.scr, PE32 11->35 dropped 73 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->73 75 Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines) 11->75 77 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 11->77 79 Drops PE files with a suspicious file extension 11->79 22 module.scr 1 11->22         started        37 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 16->37 dropped file7 signatures8 process9 signatures10 55 Multi AV Scanner detection for dropped file 22->55 57 Machine Learning detection for dropped file 22->57 59 Writes to foreign memory regions 22->59 61 2 other signatures 22->61 25 AppLaunch.exe 22->25         started        29 conhost.exe 22->29         started        31 WerFault.exe 22->31         started        33 WerFault.exe 22->33         started        process11 dnsIp12 39 176.126.103.211, 49739, 49740, 49741 SAARGATE-ASVSENETGmbHDE Ukraine 25->39 71 Tries to harvest and steal browser information (history, passwords, etc) 25->71 signatures13
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-09-08 23:29:40 UTC
File Type:
PE (Exe)
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:dcrat family:redline infostealer rat spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Legitimate hosting services abused for malware hosting/C2
Downloads MZ/PE file
Executes dropped EXE
DCRat payload
DcRat
RedLine
Malware Config
C2 Extraction:
185.106.92.8:38644
Unpacked files
SH256 hash:
db9035b7c95a334e36a7167da048ef4c05a7a160a6397be32ee29abe822a3aac
MD5 hash:
4012d9ea80bfbe828834447bcf0804ea
SHA1 hash:
313597bbebeed8ead18c3f21b2a460d4c01e9f8b
Detections:
redline
SH256 hash:
45b76fce339fdd9b0737679a358b178ccae8bbf860789d937eba2e77e247ae78
MD5 hash:
7febd1d3c2350eb770678b717b3b3f44
SHA1 hash:
a4c4a4f58ba02a6c749ae0f763cc8ef1bd98434e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 45b76fce339fdd9b0737679a358b178ccae8bbf860789d937eba2e77e247ae78

(this sample)

  
Delivery method
Distributed via web download

Comments