MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 46fa3d475c4f406890b4c26589c6c937c58813c2ee5a3782621e1b78288e35e9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 46fa3d475c4f406890b4c26589c6c937c58813c2ee5a3782621e1b78288e35e9
SHA3-384 hash: 3b0e6f3b3fa3a98e77d9d95a46c32007f08675d006eb37e6d80cb6f6ccd6719f194301f06ee4799ea3392782378bc515
SHA1 hash: 727f85bd339fa0da213b14ee7fa5a2e68d8adfb8
MD5 hash: 3f0ae1e3bfe4a7082e07344a1b2ae694
humanhash: yellow-delta-nitrogen-ink
File name:3f0ae1e3bfe4a7082e07344a1b2ae694.exe
Download: download sample
Signature RedLineStealer
File size:459'776 bytes
First seen:2021-09-19 06:31:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f326f88ca83c9aacaa44acfb8884f1d4 (8 x RedLineStealer, 4 x DCRat, 2 x CoinMiner)
ssdeep 12288:65oaqjp/9TlIwxt/oIYmJoJDHN+57aAK/AZ51L4nV1Gk/JGK:65v4DTlHxZjY1DHg7U45EnVV/IK
Threatray 65 similar samples on MalwareBazaar
TLSH T156A4F0ABB2E101D4DAF242FAD9921702E77174722714A3DB677413B21B2B8C69F3D394
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
204
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
3f0ae1e3bfe4a7082e07344a1b2ae694.exe
Verdict:
No threats detected
Analysis date:
2021-09-19 06:32:13 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process from a recently created file
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the Windows subdirectories
Deleting a recently created file
Replacing files
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
45 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected BatToExe compiled binary
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 485869 Sample: 6t6y5sW3Vj.exe Startdate: 19/09/2021 Architecture: WINDOWS Score: 45 26 Multi AV Scanner detection for submitted file 2->26 28 Yara detected BatToExe compiled binary 2->28 7 6t6y5sW3Vj.exe 9 2->7         started        process3 file4 22 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 7->22 dropped 10 cmd.exe 3 7->10         started        12 conhost.exe 7->12         started        process5 process6 14 extd.exe 2 10->14         started        18 extd.exe 2 10->18         started        20 extd.exe 1 10->20         started        dnsIp7 24 cdn.discordapp.com 162.159.134.233, 443, 49733, 49734 CLOUDFLARENETUS United States 14->24 30 Multi AV Scanner detection for dropped file 14->30 signatures8
Threat name:
Win64.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-18 19:39:29 UTC
AV detection:
14 of 45 (31.11%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@fade_rus discovery infostealer spyware stealer suricata upx
Behaviour
Creates scheduled task(s)
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
suricata: ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
Malware Config
C2 Extraction:
45.137.190.170:19896
Unpacked files
SH256 hash:
46fa3d475c4f406890b4c26589c6c937c58813c2ee5a3782621e1b78288e35e9
MD5 hash:
3f0ae1e3bfe4a7082e07344a1b2ae694
SHA1 hash:
727f85bd339fa0da213b14ee7fa5a2e68d8adfb8
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 46fa3d475c4f406890b4c26589c6c937c58813c2ee5a3782621e1b78288e35e9

(this sample)

  
Delivery method
Distributed via web download

Comments