MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 47da94da37e3d742e3cd85e9746aa07752e9003fb7d63bb7d8bb6e0a0276d46b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA File information Comments

SHA256 hash: 47da94da37e3d742e3cd85e9746aa07752e9003fb7d63bb7d8bb6e0a0276d46b
SHA3-384 hash: 2aa8c5d9a19eab312b590124302d783030b57e05fc315c24343cef0a2a7ad59397b83bd4305e984a6ef39ac67804e4ff
SHA1 hash: 3d8e907aa51806684b6d7d95add70215ef7aed0b
MD5 hash: b400cc5a20449c471160e979ed036cad
humanhash: montana-minnesota-jersey-social
File name:PO specification dt.18-11-21.png.exe
Download: download sample
Signature RedLineStealer
File size:505'045 bytes
First seen:2021-11-18 16:56:53 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3eaa732d4dae53340f9646bdd85dac41 (11 x NetSupport, 6 x RedLineStealer, 4 x ISRStealer)
ssdeep 6144:Aw393dtLEzq58BcFN6Q8AnVqbHctb1NZ1oLlcet51mMrvbMwhdAJni89dbYIMWG1:Aw35dS4X8AnVqNL513rvR8Jb+WG6wOu/
Threatray 221 similar samples on MalwareBazaar
TLSH T1A9B40161B6E1C072E52314308DBCA771FEB4B9355670858BFB900A6DBB32EA1C726753
File icon (PE):PE icon
dhash icon c3c74d4d05233d3e (2 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
3.17.7.232:10655

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
3.17.7.232:10655 https://threatfox.abuse.ch/ioc/250766/

Intelligence


File Origin
# of uploads :
1
# of downloads :
112
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO specification dt.18-11-21.png.exe
Verdict:
Malicious activity
Analysis date:
2021-11-18 17:06:37 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
DNS request
Launching a process
Launching a service
Creating a file
Changing a file
Delayed writing of the file
Creating a process from a recently created file
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Unauthorized injection to a recently created process
Query of malicious DNS domain
Stealing user critical data
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found many strings related to Crypto-Wallets (likely being stolen)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Infostealer.RedLine
Status:
Malicious
First seen:
2021-11-18 16:57:06 UTC
AV detection:
17 of 44 (38.64%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Unpacked files
SH256 hash:
35d303aee989788ccc926a50ddb67d022451ab9c8e3cb8c73b3bb572e2aca534
MD5 hash:
7f1ce8b4b31c17284b94e92443bd8937
SHA1 hash:
f884c1e85d50e3f8d5ac56002dce9ff251a19e81
SH256 hash:
47da94da37e3d742e3cd85e9746aa07752e9003fb7d63bb7d8bb6e0a0276d46b
MD5 hash:
b400cc5a20449c471160e979ed036cad
SHA1 hash:
3d8e907aa51806684b6d7d95add70215ef7aed0b
Malware family:
RedLine
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments