MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4e55c10e79e88019cc44951789afefd670fadaa18570a9ad3bfac0a495b7278f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments

SHA256 hash: 4e55c10e79e88019cc44951789afefd670fadaa18570a9ad3bfac0a495b7278f
SHA3-384 hash: 02b7ad6efd7cbfc971c29ba0a0e11159bd3919354bd2e151e359a60da60dccdabc81faf34e33583470f89b0d0d961b7a
SHA1 hash: 773de83d5315ebe27662bfc325f783b6c4aee3fd
MD5 hash: 653900a45b22641e4dec1a02af9bf102
humanhash: tennis-beryllium-ack-dakota
File name:11.exe
Download: download sample
Signature RedLineStealer
File size:2'174'464 bytes
First seen:2023-07-06 21:43:28 UTC
Last seen:2023-09-18 04:16:39 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cea7ae85c87ddc7295d39ff9cda31d1 (85 x RedLineStealer, 71 x LummaStealer, 62 x Rhadamanthys)
ssdeep 49152:2LodI/9TGEjpKspJR6k9//NCss2Qguja:ktqk3Cs30ja
TLSH T17AA5330EA7E12877E5B20BB180A55643493278340F7F52FF56C4E97D0D227F0AA71B2A
TrID 83.0% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
6.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
4.4% (.EXE) Win64 Executable (generic) (10523/12/4)
2.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.8% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter ULTRAFRAUD
Tags:2-155-18-40-9000 exe RedLineStealer

Intelligence


File Origin
# of uploads :
3
# of downloads :
303
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
11.exe
Verdict:
No threats detected
Analysis date:
2023-07-06 21:45:30 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Sending a custom TCP request
Searching for the window
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Creating a file in the Program Files subdirectories
Creating a service
Launching a service
Modifying a system file
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Creating a file
Creating a file in the system32 subdirectories
DNS request
Enabling autorun for a service
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
advpack autoit CAB control crypto explorer greyware hacktool installer keylogger lolbin lolbin packed remote rundll32 setupapi shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Binary is likely a compiled AutoIt script file
Connects to many ports of the same IP (likely port scanning)
Contains functionality to modify clipboard data
Creates files in the system32 config directory
Found API chain indicative of debugger detection
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to delay execution (extensive OutputDebugStringW loop)
Uses dynamic DNS services
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1268614 Sample: 11.exe Startdate: 06/07/2023 Architecture: WINDOWS Score: 100 65 Multi AV Scanner detection for dropped file 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 2->69 71 6 other signatures 2->71 9 11.exe 1 4 2->9         started        12 MeshAgent.exe 8 8 2->12         started        16 rundll32.exe 2->16         started        process3 dnsIp4 57 C:\Users\user\AppData\Local\...\setup.exe, PE32 9->57 dropped 59 C:\Users\user\AppData\Local\...\atmtins.exe, PE32+ 9->59 dropped 18 atmtins.exe 9->18         started        63 serrapirate2121.duckdns.org 46.25.249.218, 23768, 49699 VODAFONE_ESES Spain 12->63 79 Query firmware table information (likely to detect VMs) 12->79 81 Creates files in the system32 config directory 12->81 21 WMIC.exe 12->21         started        23 WMIC.exe 12->23         started        25 WMIC.exe 12->25         started        27 4 other processes 12->27 file5 signatures6 process7 signatures8 73 Binary is likely a compiled AutoIt script file 18->73 75 Found API chain indicative of debugger detection 18->75 77 Contains functionality to modify clipboard data 18->77 29 setup.exe 2 18->29         started        32 conhost.exe 21->32         started        34 conhost.exe 23->34         started        36 conhost.exe 25->36         started        38 conhost.exe 27->38         started        40 conhost.exe 27->40         started        42 conhost.exe 27->42         started        44 conhost.exe 27->44         started        process9 signatures10 83 Multi AV Scanner detection for dropped file 29->83 85 Tries to delay execution (extensive OutputDebugStringW loop) 29->85 46 setup.exe 10 3 29->46         started        49 WMIC.exe 1 29->49         started        51 conhost.exe 29->51         started        process11 file12 61 C:\Program Files (x86)\...\MeshAgent.exe, PE32 46->61 dropped 53 conhost.exe 46->53         started        55 conhost.exe 49->55         started        process13
Threat name:
Win64.Trojan.Generic
Status:
Suspicious
First seen:
2023-02-23 10:03:28 UTC
File Type:
PE+ (Exe)
Extracted files:
74
AV detection:
9 of 38 (23.68%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
AutoIT Executable
Drops file in System32 directory
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Sets service image path in registry
Unpacked files
SH256 hash:
4e55c10e79e88019cc44951789afefd670fadaa18570a9ad3bfac0a495b7278f
MD5 hash:
653900a45b22641e4dec1a02af9bf102
SHA1 hash:
773de83d5315ebe27662bfc325f783b6c4aee3fd
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments