MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5657fc736fa541e5ce3a07785e09100fd93b178e57f4cac7b961e57a1b4c72dc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 5657fc736fa541e5ce3a07785e09100fd93b178e57f4cac7b961e57a1b4c72dc
SHA3-384 hash: 232a6e26e203527226eac52b12b5775b37a1744e909856a709cbd926845f5f1376ce1573e2bb75c41a123ede1c412fb6
SHA1 hash: e9ec669f505f67536b7b950a9015129c44daac60
MD5 hash: 61357d2d5ae70866702c80b6f6b8a5b1
humanhash: timing-seventeen-stream-sad
File name:61357d2d5ae70866702c80b6f6b8a5b1.exe
Download: download sample
Signature RedLineStealer
File size:426'496 bytes
First seen:2023-05-10 20:50:42 UTC
Last seen:2023-05-13 22:44:17 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5e886f6816f9ed7fecde723808a23e1c (3 x RedLineStealer, 1 x UACModuleSmokeLoader)
ssdeep 3072:4JLEJHP9bj7cNuE89glTKBUsjai+XD+Svwf1mxbypbN2tlTlZSASb+7xE8AmItTX:hH1oNG9PUsjeD+KwNyTD7+8AZGHQj1
Threatray 2 similar samples on MalwareBazaar
TLSH T1FF947E13E2D37C61E52147329E2EF6F4365EFA508F5A37AF1218AE2F09701A1C162776
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 0020401040622100 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
178.33.182.70:18918

Intelligence


File Origin
# of uploads :
2
# of downloads :
283
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
61357d2d5ae70866702c80b6f6b8a5b1.exe
Verdict:
Malicious activity
Analysis date:
2023-05-10 20:51:02 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a window
Launching the default Windows debugger (dwwin.exe)
Sending a TCP request to an infection source
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
exploit greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-05-10 20:51:08 UTC
File Type:
PE (Exe)
Extracted files:
70
AV detection:
22 of 24 (91.67%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:logsdiller cloud (telegram: @logsdillabot) discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine payload
Malware Config
C2 Extraction:
178.33.182.70:18918
Unpacked files
SH256 hash:
af5d0d1bdcfe468a53aeea272d405b1edd2b1551060ba22892d768584af66c66
MD5 hash:
00872cce9b9c82fdbccaf8f87843bb8c
SHA1 hash:
8fbe95764fb565349eaf23700f7458c6da818170
SH256 hash:
002947895ec62b875c2916de0afb1d57b1f71abd2d6c76b6826d83586c9432b6
MD5 hash:
8e66c290e3974f86f2c26a2acf2c242b
SHA1 hash:
6fab2d7abddee63e3db67461f806bbd774dfcb38
SH256 hash:
a84133f404333d0059e6b6336346acbdee71c19fc316651a59b832d688cf765a
MD5 hash:
f6aa6e5bf12c39d45a450f9f17cde64e
SHA1 hash:
6cf7d0d5dbdbb1845bac91f236c9f2152fa58b3a
Detections:
redline
Parent samples :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 hash:
d7101261935e49f3c28026c52a9b626fa1862206c21465806c280d962a590774
MD5 hash:
3fdcdf9c2d3c823e3ff8edca6aecc502
SHA1 hash:
57c14f969c6e2103eac1e9e07fb1e688e645efc8
Detections:
redline
Parent samples :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 hash:
5657fc736fa541e5ce3a07785e09100fd93b178e57f4cac7b961e57a1b4c72dc
MD5 hash:
61357d2d5ae70866702c80b6f6b8a5b1
SHA1 hash:
e9ec669f505f67536b7b950a9015129c44daac60
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 5657fc736fa541e5ce3a07785e09100fd93b178e57f4cac7b961e57a1b4c72dc

(this sample)

  
Delivery method
Distributed via web download

Comments