MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 53e715e8fa9e0ae1806e69ab59f1eec2aff8020df27bfbe45704b73aaadf1122. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 53e715e8fa9e0ae1806e69ab59f1eec2aff8020df27bfbe45704b73aaadf1122
SHA3-384 hash: 423ab2b9b1a433dbd2eb367bba7b400529cdc153d0e50def891eecfdbaf9e6c2105c502aca720d78aa6ec97c59449e4d
SHA1 hash: 8f542cffc08cf4736c966616b2472fcacc895321
MD5 hash: 780e3c9e718a60eb5a86a21ec8f90cae
humanhash: single-oscar-solar-neptune
File name:file
Download: download sample
Signature RedLineStealer
File size:1'267'616 bytes
First seen:2022-09-05 00:04:25 UTC
Last seen:2022-09-05 06:30:56 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'655 x AgentTesla, 19'464 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 24576:HqdFJntj+KDbBG5+3Cv4rVnRInkYu6YzW/+TRa:Hqdpj+gLjnRa6vzWmVa
TLSH T166455C16B4DE422BD1FE993FD75C3670F6275288828E61565683392ACF8B706EF38311
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from https://smartectechnologies.com/12/TrdngAnr6339.exe

Intelligence


File Origin
# of uploads :
5
# of downloads :
334
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-09-05 00:05:08 UTC
Tags:
trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the system32 subdirectories
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Moving a file to the %AppData% subdirectory
Сreating synchronization primitives
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Running batch commands
Creating a process with a hidden window
DNS request
Searching for the window
Creating a window
Query of malicious DNS domain
Sending a TCP request to an infection source
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm cerbu overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Drops PE files with benign system names
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 697332 Sample: file.exe Startdate: 05/09/2022 Architecture: WINDOWS Score: 100 91 api.ip.sb 2->91 93 yandex.ru 2->93 95 iplogger.org 2->95 113 Multi AV Scanner detection for domain / URL 2->113 115 Malicious sample detected (through community Yara rule) 2->115 117 Antivirus detection for URL or domain 2->117 119 10 other signatures 2->119 11 file.exe 15 5 2->11         started        16 dllhost.exe 2->16         started        18 msedge.exe 2->18         started        20 2 other processes 2->20 signatures3 process4 dnsIp5 109 nominally.ru 188.114.97.3, 443, 49711, 49727 CLOUDFLARENETUS European Union 11->109 81 C:\...\167713851-CF1181JIP3HRtQK7X5p.exe, PE32 11->81 dropped 83 C:\Users\user\AppData\Local\...\file.exe.log, ASCII 11->83 dropped 149 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 11->149 22 167713851-CF1181JIP3HRtQK7X5p.exe 1 11->22         started        25 226212076-CF1181JIP3HRtQK7X5p.exe 11->25         started        151 Antivirus detection for dropped file 16->151 153 Multi AV Scanner detection for dropped file 16->153 155 Machine Learning detection for dropped file 16->155 28 WerFault.exe 10 18->28         started        30 WerFault.exe 10 20->30         started        file6 signatures7 process8 dnsIp9 129 Multi AV Scanner detection for dropped file 22->129 131 Creates HTML files with .exe extension (expired dropper behavior) 22->131 133 Contains functionality to inject code into remote processes 22->133 141 2 other signatures 22->141 32 167713851-CF1181JIP3HRtQK7X5p.exe 1 11 22->32         started        37 conhost.exe 22->37         started        107 xoralessh.xyz 94.140.115.207, 49744, 80 NANO-ASLV Latvia 25->107 135 Antivirus detection for dropped file 25->135 137 Performs DNS queries to domains with low reputation 25->137 139 Machine Learning detection for dropped file 25->139 signatures10 process11 dnsIp12 85 94.26.226.51, 49712, 49713, 49714 PTC-YEMENNETYE Russian Federation 32->85 87 ge-ck365.com 103.74.123.2, 49721, 49724, 49725 FPT-AS-APTheCorporationforFinancingPromotingTechnolo Viet Nam 32->87 89 2 other IPs or domains 32->89 63 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 32->63 dropped 65 C:\Users\user\AppData\...\8FE3HIL11E636DG.exe, PE32+ 32->65 dropped 67 C:\Users\user\AppData\...\74IG88MF272IFGL.exe, PE32 32->67 dropped 69 4 other files (3 malicious) 32->69 dropped 111 Creates multiple autostart registry keys 32->111 39 74IG88MF272IFGL.exe 32->39         started        44 1GC0385EH17891J.exe 32->44         started        46 50FMLL07K0EG2C3.exe 14 5 32->46         started        48 3 other processes 32->48 file13 signatures14 process15 dnsIp16 99 188.114.96.3, 443, 49740 CLOUDFLARENETUS European Union 39->99 101 nominally.ru 39->101 73 C:\...\192284611-CF1181JIP3HRtQK7X5p.exe, PE32 39->73 dropped 143 Multi AV Scanner detection for dropped file 39->143 145 Machine Learning detection for dropped file 39->145 50 192284611-CF1181JIP3HRtQK7X5p.exe 39->50         started        103 nominally.ru 44->103 75 C:\...\705175463-CF1181JIP3HRtQK7X5p.exe, PE32 44->75 dropped 55 705175463-CF1181JIP3HRtQK7X5p.exe 44->55         started        105 nominally.ru 46->105 77 C:\...\226212076-CF1181JIP3HRtQK7X5p.exe, PE32 46->77 dropped 79 C:\Users\user\AppData\Local\Temp\fBceBf.kXd, PE32 48->79 dropped 147 Antivirus detection for dropped file 48->147 57 msedge.exe 48->57         started        59 msiexec.exe 48->59         started        file17 signatures18 process19 dnsIp20 97 yandex.ru 5.255.255.50, 443, 49742 YANDEXRU Russian Federation 50->97 71 C:\Users\user\AppData\Roaming\...\dllhost.exe, PE32 50->71 dropped 121 Antivirus detection for dropped file 50->121 123 Multi AV Scanner detection for dropped file 50->123 125 Machine Learning detection for dropped file 50->125 127 Creates multiple autostart registry keys 50->127 61 WerFault.exe 20 9 57->61         started        file21 signatures22 process23
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-09-04 21:51:14 UTC
File Type:
PE (.Net Exe)
AV detection:
21 of 40 (52.50%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:lyla.03.09 botnet:mettop1 discovery infostealer miner persistence spyware stealer
Behaviour
Modifies Internet Explorer settings
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Detectes Phoenix Miner Payload
RedLine
Malware Config
C2 Extraction:
xoralessh.xyz:80
185.215.113.216:21921
Unpacked files
SH256 hash:
0c51e2f22cc73b4de5fea266575e47823f16915e66378fd3e1a69bd0e9669b24
MD5 hash:
6d023cad8125572571e718d778ddc96b
SHA1 hash:
06689ea1ace0065adf51aee18146604ecb8d59de
SH256 hash:
53e715e8fa9e0ae1806e69ab59f1eec2aff8020df27bfbe45704b73aaadf1122
MD5 hash:
780e3c9e718a60eb5a86a21ec8f90cae
SHA1 hash:
8f542cffc08cf4736c966616b2472fcacc895321
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments