MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 54deea77c66f31b5b2ae101d942ddc0acd04a146f1dadf85f80034e1f6edd567. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: 54deea77c66f31b5b2ae101d942ddc0acd04a146f1dadf85f80034e1f6edd567
SHA3-384 hash: 5d1a2f8657de5826cbcdbdbc624600c77b985fb9ec43bc3e375591a4aa79fd68196cd86a5a6cf021d0edec4c390ff93c
SHA1 hash: dfa7b0b4d24a93e4463921dbc7886e84dfd60495
MD5 hash: 8fa76cd75fe02c1093f254977f44ee79
humanhash: edward-low-hotel-mars
File name:8fa76cd75fe02c1093f254977f44ee79
Download: download sample
Signature RedLineStealer
File size:403'688 bytes
First seen:2021-08-16 00:31:27 UTC
Last seen:2021-08-16 01:40:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b535572a0356e55475d8da75f1f57f3e (1 x RedLineStealer)
ssdeep 6144:LNrji59qUe4LHW60V4Ayscy2sF3Y/VAOYc219/BtJTjjn1LFois8ICCKzche/9Wn:L1U9qUe4LZ0N8VwJn1LFoipIMz/QGbi9
Threatray 1'202 similar samples on MalwareBazaar
TLSH T171849D047AE15432E5F2053099FC9A758A39B8301B319AFF63D4863D9F316C19E39F6A
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Your+File+Is+Ready+To+Download.rar
Verdict:
Malicious activity
Analysis date:
2021-08-15 18:04:54 UTC
Tags:
evasion loader trojan stealer raccoon rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Sending a UDP request
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a window
Connection attempt
Sending an HTTP POST request
Sending a custom TCP request
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Using the Windows Management Instrumentation requests
Stealing user critical data
Unauthorized injection to a system process
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Suspicious Process Start Without DLL
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Phonzy
Status:
Malicious
First seen:
2021-08-15 18:53:24 UTC
AV detection:
11 of 28 (39.29%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@soul3ss infostealer spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
188.130.139.12:23747
Unpacked files
SH256 hash:
cde21b9c13f3b13f28c7f505d49a318a355aa563916f7eb95d653301227f892b
MD5 hash:
519ec47b32c21c552725b6290cef4e12
SHA1 hash:
9559fdd06f5019d6f023c2d23b1de0ab7d7b5686
SH256 hash:
54deea77c66f31b5b2ae101d942ddc0acd04a146f1dadf85f80034e1f6edd567
MD5 hash:
8fa76cd75fe02c1093f254977f44ee79
SHA1 hash:
dfa7b0b4d24a93e4463921dbc7886e84dfd60495
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 54deea77c66f31b5b2ae101d942ddc0acd04a146f1dadf85f80034e1f6edd567

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-08-16 00:31:28 UTC

url : hxxp://37.0.11.8/WW/file6.exe