MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 572b535439e38db4d65ea6128e7d5a4a8c3bfbe3f2b3ec3d6aa7ec4224c81b31. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 572b535439e38db4d65ea6128e7d5a4a8c3bfbe3f2b3ec3d6aa7ec4224c81b31
SHA3-384 hash: f9bb6a24810b875f973de27a3ca886b1ca400b5a028f58d335138cc947029767d98d509f3c553b81228bbabc50f45bd5
SHA1 hash: b1a3b5210da16b0044cbffaf5243c63b6012fc3e
MD5 hash: cede7e681269355e227d65247a6cd822
humanhash: neptune-three-enemy-orange
File name:cede7e681269355e227d65247a6cd822.exe
Download: download sample
Signature RedLineStealer
File size:365'056 bytes
First seen:2021-09-09 07:14:58 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 96b0c0b056f44468723aefb84fe936ee (6 x Stop, 5 x RedLineStealer, 3 x RaccoonStealer)
ssdeep 6144:Fkc0agNjtpJk95K/Q3omK4uJ6i9Tl+mkViakZI+GfRQnMlZRNFa3:b0agnpJ65K/Q3oeMxRoiDZWfqnMlnN6
Threatray 1'964 similar samples on MalwareBazaar
TLSH T18E74AD346EBCC435E1B312B446B6C3B8A5297EA17B3050CB62E43A9ED6347E49D31B47
dhash icon 9824e790c4e72158 (31 x RedLineStealer, 18 x Smoke Loader, 16 x ArkeiStealer)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
124
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cede7e681269355e227d65247a6cd822.exe
Verdict:
Malicious activity
Analysis date:
2021-09-09 07:37:19 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sending a custom TCP request
DNS request
Sending a UDP request
Creating a window
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a file
Stealing user critical data
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
84 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-09 07:15:18 UTC
AV detection:
21 of 44 (47.73%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:uts discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
45.9.20.20:13441
Unpacked files
SH256 hash:
0af5150a5c8f9a5f2678baf604a172626ed229efb82df96d7c358b27eb035b95
MD5 hash:
45b9ad483e9f5647e8f37dc8824d3831
SHA1 hash:
fe09a099996b14eea72674be9a9a6c5963cf7cb8
SH256 hash:
2fe3f6fc8b9b9f4d1bddc0e97ddd64229da2a069cf199bcd435d14a3e27e4e19
MD5 hash:
f0f9a9448f7a0494d9bf6e11694bfce0
SHA1 hash:
e3d5c8af3b294813b562fead751cc5c2f5c8a51c
SH256 hash:
9fd5a295d9c662d120e8d2688ac4b645c3f4390299e4649b8bf76172f6a66425
MD5 hash:
07e9d4478cddb490f89b0edb4842ab0e
SHA1 hash:
48ea47adc76e29fbb23f8c82c7d1b4761f3216fa
SH256 hash:
572b535439e38db4d65ea6128e7d5a4a8c3bfbe3f2b3ec3d6aa7ec4224c81b31
MD5 hash:
cede7e681269355e227d65247a6cd822
SHA1 hash:
b1a3b5210da16b0044cbffaf5243c63b6012fc3e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 572b535439e38db4d65ea6128e7d5a4a8c3bfbe3f2b3ec3d6aa7ec4224c81b31

(this sample)

  
Delivery method
Distributed via web download

Comments