MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e53f8f9a33ce0371b9b63a41a48f1f29c53330c6ddd66e152ff588589b4987d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA File information Comments

SHA256 hash: 4e53f8f9a33ce0371b9b63a41a48f1f29c53330c6ddd66e152ff588589b4987d
SHA3-384 hash: aad1a1232350bcdc293d2254ee165f5ec19e778cbbe22c79ac8bbcb0a509540319a83b117d8e80b845ee65d7d7cc4f67
SHA1 hash: 5057c24952e0662fd5ba09d468b06eda495d4862
MD5 hash: d8d2b04f04ccdd81d5383423d76f93cf
humanhash: glucose-black-sink-oscar
File name:d8d2b04f04ccdd81d5383423d76f93cf.exe
Download: download sample
Signature RedLineStealer
File size:259'072 bytes
First seen:2021-09-26 04:04:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1d8fbfe9f1ddd15c4632d3ab4f1ae1bf (11 x RedLineStealer, 5 x RaccoonStealer)
ssdeep 3072:wOY7Z8SS7JidTEyJudXD0HST9a7V1m3HLjM8XeAv+rhO5uvEUgS9H6dYe:wO2Z85JiPJUXD0HQB3H3M8XrgGrEad
Threatray 2'303 similar samples on MalwareBazaar
TLSH T10344D02075A9F732D3E705345A7CA3A7263BB8221D63C64AE75D176A1F312C1AFE1312
File icon (PE):PE icon
dhash icon fcfc94f4d4d4d8c0 (7 x RedLineStealer, 7 x RaccoonStealer, 3 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.9.20.20:13441

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.9.20.20:13441 https://threatfox.abuse.ch/ioc/226443/

Intelligence


File Origin
# of uploads :
1
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d8d2b04f04ccdd81d5383423d76f93cf.exe
Verdict:
Malicious activity
Analysis date:
2021-09-26 04:05:09 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a service
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
84 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-09-26 04:05:16 UTC
AV detection:
20 of 45 (44.44%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:uts discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
45.9.20.20:13441
Unpacked files
SH256 hash:
0af5150a5c8f9a5f2678baf604a172626ed229efb82df96d7c358b27eb035b95
MD5 hash:
45b9ad483e9f5647e8f37dc8824d3831
SHA1 hash:
fe09a099996b14eea72674be9a9a6c5963cf7cb8
SH256 hash:
2fe3f6fc8b9b9f4d1bddc0e97ddd64229da2a069cf199bcd435d14a3e27e4e19
MD5 hash:
f0f9a9448f7a0494d9bf6e11694bfce0
SHA1 hash:
e3d5c8af3b294813b562fead751cc5c2f5c8a51c
SH256 hash:
9fd5a295d9c662d120e8d2688ac4b645c3f4390299e4649b8bf76172f6a66425
MD5 hash:
07e9d4478cddb490f89b0edb4842ab0e
SHA1 hash:
48ea47adc76e29fbb23f8c82c7d1b4761f3216fa
SH256 hash:
4e53f8f9a33ce0371b9b63a41a48f1f29c53330c6ddd66e152ff588589b4987d
MD5 hash:
d8d2b04f04ccdd81d5383423d76f93cf
SHA1 hash:
5057c24952e0662fd5ba09d468b06eda495d4862
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 4e53f8f9a33ce0371b9b63a41a48f1f29c53330c6ddd66e152ff588589b4987d

(this sample)

  
Delivery method
Distributed via web download

Comments