MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 461d1703fd2a8263e65ae5a5cbeecf901190822b993d08b43731d96d5b7da4f2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 2 File information Comments

SHA256 hash: 461d1703fd2a8263e65ae5a5cbeecf901190822b993d08b43731d96d5b7da4f2
SHA3-384 hash: b6906ac4520e25c58f97a3cfb6a601c19c0eb84b88225a4c53d7da665fb533e524df8f4f9d8c5e81e6ee16a06a97d4ff
SHA1 hash: 0352749e39f8c69dc7e3163d72dd0dbf3d935596
MD5 hash: 546213b5be34dd84d13044c84c5c3ee3
humanhash: lima-massachusetts-december-seven
File name:546213b5be34dd84d13044c84c5c3ee3.exe
Download: download sample
Signature RedLineStealer
File size:2'043'392 bytes
First seen:2023-02-17 22:50:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 49152:nfGH3XLz3bvGIAZcWPMt8vOmOVDnuyjB3:g/3bWZcWPM8vOmOVD15
Threatray 4'265 similar samples on MalwareBazaar
TLSH T19A95230BE6D9C462C4BBDB7016F9178309B9BCA05F7892CE374D6D4A18732AD7934722
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.233.20.17:4139

Intelligence


File Origin
# of uploads :
1
# of downloads :
258
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
546213b5be34dd84d13044c84c5c3ee3.exe
Verdict:
Malicious activity
Analysis date:
2023-02-17 22:51:14 UTC
Tags:
trojan amadey loader rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Launching a process
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
advpack.dll anti-vm comodo greyware packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, CryptOne, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected CryptOne packer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 811135 Sample: 2g7247nY0R.exe Startdate: 17/02/2023 Architecture: WINDOWS Score: 100 126 Snort IDS alert for network traffic 2->126 128 Malicious sample detected (through community Yara rule) 2->128 130 Antivirus detection for URL or domain 2->130 132 12 other signatures 2->132 11 2g7247nY0R.exe 1 4 2->11         started        14 rundll32.exe 2->14         started        16 rundll32.exe 2->16         started        18 4 other processes 2->18 process3 file4 110 C:\Users\user\AppData\Local\...\thA73Pn.exe, PE32 11->110 dropped 112 C:\Users\user\AppData\Local\...\cpz96QC.exe, PE32 11->112 dropped 20 cpz96QC.exe 1 4 11->20         started        24 thA73Pn.exe 2 11->24         started        process5 dnsIp6 90 C:\Users\user\AppData\Local\...\cRE75.exe, PE32 20->90 dropped 92 C:\Users\user\AppData\Local\...\bDM74.exe, PE32 20->92 dropped 142 Multi AV Scanner detection for dropped file 20->142 144 Machine Learning detection for dropped file 20->144 27 cRE75.exe 3 20->27         started        31 bDM74.exe 3 8 20->31         started        124 193.233.20.11, 4131 REDCOM-ASRedcomKhabarovskRussiaRU Russian Federation 24->124 146 Detected unpacking (changes PE section rights) 24->146 148 Detected unpacking (overwrites its own PE header) 24->148 file7 signatures8 process9 file10 114 C:\Users\user\AppData\Local\...\mnolyk.exe, PE32 27->114 dropped 176 Multi AV Scanner detection for dropped file 27->176 178 Machine Learning detection for dropped file 27->178 180 Contains functionality to inject code into remote processes 27->180 33 mnolyk.exe 2 25 27->33         started        116 C:\Users\user\AppData\Local\Temp\kiKpsC.cpl, PE32 31->116 dropped 38 control.exe 1 31->38         started        signatures11 process12 dnsIp13 118 62.204.41.5, 49683, 49684, 49686 TNNET-ASTNNetOyMainnetworkFI United Kingdom 33->118 120 193.233.20.16, 49685, 49687, 80 REDCOM-ASRedcomKhabarovskRussiaRU Russian Federation 33->120 82 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 33->82 dropped 84 C:\Users\user\AppData\Local\...\notru.exe, PE32 33->84 dropped 86 C:\Users\user\AppData\Local\...\truno.exe, PE32 33->86 dropped 88 3 other malicious files 33->88 dropped 134 Multi AV Scanner detection for dropped file 33->134 136 Creates an undocumented autostart registry key 33->136 138 Machine Learning detection for dropped file 33->138 140 2 other signatures 33->140 40 notru.exe 33->40         started        44 truno.exe 33->44         started        46 cmd.exe 33->46         started        50 2 other processes 33->50 48 rundll32.exe 38->48         started        file14 signatures15 process16 file17 102 C:\Users\user\AppData\Local\...\vwS4617.exe, PE32 40->102 dropped 104 C:\Users\user\AppData\Local\...\uZi09Hn.exe, PE32 40->104 dropped 172 Antivirus detection for dropped file 40->172 174 Machine Learning detection for dropped file 40->174 52 vwS4617.exe 40->52         started        106 C:\Users\user\AppData\Local\...\neE77Jp14.exe, PE32 44->106 dropped 108 C:\Users\user\AppData\Local\...\fIN11bW.exe, PE32 44->108 dropped 56 neE77Jp14.exe 44->56         started        58 conhost.exe 46->58         started        60 cmd.exe 46->60         started        62 cacls.exe 46->62         started        68 4 other processes 46->68 64 rundll32.exe 48->64         started        66 conhost.exe 50->66         started        signatures18 process19 file20 94 C:\Users\user\AppData\Local\...\tUs38Ax.exe, PE32 52->94 dropped 96 C:\Users\user\AppData\Local\...\rUm6737.exe, PE32 52->96 dropped 150 Antivirus detection for dropped file 52->150 152 Machine Learning detection for dropped file 52->152 70 tUs38Ax.exe 52->70         started        74 rUm6737.exe 52->74         started        98 C:\Users\user\AppData\Local\...\eqT76rJ.exe, PE32 56->98 dropped 100 C:\Users\user\AppData\Local\...\dFa11GL.exe, PE32 56->100 dropped 76 eqT76rJ.exe 56->76         started        78 dFa11GL.exe 56->78         started        80 rundll32.exe 64->80         started        signatures21 process22 dnsIp23 122 193.233.20.17, 4139, 49802, 49825 REDCOM-ASRedcomKhabarovskRussiaRU Russian Federation 70->122 154 Antivirus detection for dropped file 70->154 156 Multi AV Scanner detection for dropped file 70->156 158 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 70->158 170 3 other signatures 70->170 160 Detected unpacking (changes PE section rights) 76->160 162 Detected unpacking (overwrites its own PE header) 76->162 164 Machine Learning detection for dropped file 76->164 166 Disable Windows Defender notifications (registry) 78->166 168 Disable Windows Defender real time protection (registry) 78->168 signatures24
Threat name:
Win32.Infostealer.Dridex
Status:
Malicious
First seen:
2023-02-11 01:29:41 UTC
File Type:
PE (Exe)
Extracted files:
193
AV detection:
30 of 39 (76.92%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:dubik botnet:furka botnet:romka botnet:ronam discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Downloads MZ/PE file
Amadey
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
Malware Config
C2 Extraction:
62.204.41.5/Bu58Ngs/index.php
193.233.20.11:4131
193.233.20.17:4139
Unpacked files
SH256 hash:
e475d5168588e1e443113dd3db608d14e34c39478e41f99ebc56c77d3d04ad34
MD5 hash:
41d07cd698017a97c207921e62222bd5
SHA1 hash:
9e1de6c707f15de5a09c0cefd302c95139ffb6d7
SH256 hash:
93e2dba65a033886c60f9a8409547e00ae64c5247eb5b93e0790226b0dd6379c
MD5 hash:
92c11ab7633534cb092b9cc6699ab6dc
SHA1 hash:
b9ae5fec261d721d19b274b2a9a7c2a2cf39b02d
SH256 hash:
ee5b259570d4955a32fe33be9e81a5063d63e21ccc8d2dcd0aa3fe1a506fce08
MD5 hash:
c127098ba6f7f38252032fa6dd1fd4a5
SHA1 hash:
00273121d0bff657bdc808a2eebebe48898139dc
SH256 hash:
3556ad8461183be4cf8035e05997bb6f1d558939cf60bd191d067155e17d380b
MD5 hash:
f486e6179904f7c679f5c18609d1acdd
SHA1 hash:
78e6811ffee2734967a71d1744aced8c682001be
SH256 hash:
461d1703fd2a8263e65ae5a5cbeecf901190822b993d08b43731d96d5b7da4f2
MD5 hash:
546213b5be34dd84d13044c84c5c3ee3
SHA1 hash:
0352749e39f8c69dc7e3163d72dd0dbf3d935596
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments