MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4dcff0d28d08fefd0160b28aa46e5b859b076a42803eb783dd562d54f7dabf44. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 1 File information Comments 1

SHA256 hash: 4dcff0d28d08fefd0160b28aa46e5b859b076a42803eb783dd562d54f7dabf44
SHA3-384 hash: 443ca5478181fbcc1138bdbcbd84d259ac086d971272bfef687a7ed2f16cb31a926cea15ece1303fc8743b2f42f92e39
SHA1 hash: db86173e44b2223f36ba80be3380c76523ee90af
MD5 hash: dff05a79f92b7f4906abefc992ce632d
humanhash: chicken-fourteen-emma-ceiling
File name:dff05a79f92b7f4906abefc992ce632d
Download: download sample
Signature RedLineStealer
File size:380'416 bytes
First seen:2022-03-17 12:25:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1bd024066a86f151729fa49bd4381603 (3 x ArkeiStealer, 2 x RaccoonStealer, 1 x Smoke Loader)
ssdeep 6144:1TldL9I3dkKzVXh36ebnvHUX+4Oclj8XeBKmAj:Bldxc1VR6ebvHUuDkj2eJ
Threatray 3'433 similar samples on MalwareBazaar
TLSH T1C384F122B790C173F0639530A821C621A7BF793256B9CD0F7B9927364E712C29E7974B
File icon (PE):PE icon
dhash icon aca3b1a5a0a5b38f (1 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
208
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dff05a79f92b7f4906abefc992ce632d
Verdict:
Suspicious activity
Analysis date:
2022-03-18 01:27:26 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
SystemUptime
MeasuringTime
EvasionGetTickCount
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm azorult emotet greyware lokibot mikey
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2022-03-11 09:57:16 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
38 of 42 (90.48%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:newssbuilds9 infostealer
Behaviour
Suspicious use of AdjustPrivilegeToken
RedLine
RedLine Payload
Malware Config
C2 Extraction:
169.197.141.182:47320
Unpacked files
SH256 hash:
911f7cb8561c484621ccb0570363f33999cbd2d7630c1446b2f7b380a70fe9f4
MD5 hash:
4587bd8c693719bedfdde71b437ba46d
SHA1 hash:
760e0751a7bc0d45d8f545f8d4db8bb369960940
SH256 hash:
3c154fa234963a86d8c18c446602e88f50916b288910ec7adb353a74d1a5c948
MD5 hash:
11eb1040b4d63b1fb78d12c0cbb39405
SHA1 hash:
87122c905ce9d9e9f12114b84201b54448da0502
SH256 hash:
7edcb2c3ccacf89c02fb357b29b6b895f85e48d3e39fead2def2db8c0b8a22a0
MD5 hash:
997f8c3b6b1440e5ed40de9b11bd86ac
SHA1 hash:
da959a7deae7f481bd65d24cc7e9fa42f36dbcfc
SH256 hash:
4dcff0d28d08fefd0160b28aa46e5b859b076a42803eb783dd562d54f7dabf44
MD5 hash:
dff05a79f92b7f4906abefc992ce632d
SHA1 hash:
db86173e44b2223f36ba80be3380c76523ee90af
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 4dcff0d28d08fefd0160b28aa46e5b859b076a42803eb783dd562d54f7dabf44

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-03-17 12:25:21 UTC

url : hxxp://185.215.113.119/shzkAsk129Azxc/test3.exe