MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4adb694efcbcee94dd7aba7cd8d717eeccd06239bfb89555440f2d5506af8b90. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: 4adb694efcbcee94dd7aba7cd8d717eeccd06239bfb89555440f2d5506af8b90
SHA3-384 hash: 584eb5de6df70cd6c8bab6e4b653ae430ea372597be8ee2c653222abe01fe9389e4772b67f83b8992d0c05afd3814a86
SHA1 hash: 5d240b39fc84faf41b834fae5c1ea49d0b2b711f
MD5 hash: ede7812d29098515836754ed757358e1
humanhash: mirror-nebraska-magnesium-maine
File name:ede7812d29098515836754ed757358e1.exe
Download: download sample
Signature RedLineStealer
File size:457'728 bytes
First seen:2021-09-30 17:56:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7182b1ea6f92adbf459a2c65d8d4dd9e (5 x CoinMiner, 4 x RedLineStealer, 4 x DCRat)
ssdeep 12288:objDhu9TaMsCO4SoKQVmAuGTAjnlKI9jETnLEqs:W1eTadCO4Sob7uGdwjens
Threatray 68 similar samples on MalwareBazaar
TLSH T1F7A4F156B2E41188CBB245F1C9821746EB71B4321B11A3DB6B7457B32B5B8CA8F7D3E0
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
37.230.112.47:49799

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
37.230.112.47:49799 https://threatfox.abuse.ch/ioc/228889/

Intelligence


File Origin
# of uploads :
1
# of downloads :
165
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ede7812d29098515836754ed757358e1.exe
Verdict:
No threats detected
Analysis date:
2021-09-30 18:47:10 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the Windows subdirectories
Deleting a recently created file
Replacing files
Using the Windows Management Instrumentation requests
Creating a file
Reading critical registry keys
Stealing user critical data
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected BatToExe compiled binary
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 494601 Sample: JEFxakY5NB.exe Startdate: 30/09/2021 Architecture: WINDOWS Score: 60 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected BatToExe compiled binary 2->30 7 JEFxakY5NB.exe 9 2->7         started        process3 file4 22 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 7->22 dropped 10 cmd.exe 3 7->10         started        process5 process6 12 extd.exe 1 10->12         started        15 extd.exe 2 10->15         started        18 extd.exe 2 10->18         started        20 2 other processes 10->20 dnsIp7 32 Multi AV Scanner detection for dropped file 12->32 24 cdn.discordapp.com 162.159.133.233, 443, 49762 CLOUDFLARENETUS United States 15->24 26 162.159.129.233, 443, 49763 CLOUDFLARENETUS United States 18->26 signatures8
Threat name:
Win64.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-30 17:57:06 UTC
AV detection:
20 of 45 (44.44%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer suricata upx
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
Malware Config
C2 Extraction:
37.230.112.47:49799
Unpacked files
SH256 hash:
4adb694efcbcee94dd7aba7cd8d717eeccd06239bfb89555440f2d5506af8b90
MD5 hash:
ede7812d29098515836754ed757358e1
SHA1 hash:
5d240b39fc84faf41b834fae5c1ea49d0b2b711f
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 4adb694efcbcee94dd7aba7cd8d717eeccd06239bfb89555440f2d5506af8b90

(this sample)

  
Delivery method
Distributed via web download

Comments