MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 579532a04b63aac5992010d56fa6cc982855b194d9782f5cfff3b063192a94d0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: 579532a04b63aac5992010d56fa6cc982855b194d9782f5cfff3b063192a94d0
SHA3-384 hash: 74f54efa06d1b9e3fd3d8862c8544fe774a848b9636ef68595c72500b42a7987f172350d973777401e144a0bda7825ca
SHA1 hash: 691f4c4d7b8b126708fcd78b2f4b576af289640f
MD5 hash: 67be58406c35ca33314957be60ec7402
humanhash: blossom-triple-mike-oscar
File name:file
Download: download sample
Signature RedLineStealer
File size:296'960 bytes
First seen:2023-01-29 10:27:39 UTC
Last seen:2023-01-29 19:30:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 3072:bOhX0N7+f1c57UQyHjTweABJPNG8l5CbgCj9E0OMx7e:ihEN7+ZHDmBJVJOgv0OMJe
TLSH T173541E46B38999DEF4913F3084E23F67137A2E60205D1E43AE3276CA7E751C1706F6A5
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon 308a8a8c8c8a8a30 (6 x AgentTesla, 3 x Formbook, 2 x a310Logger)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from https://vk.com/doc139074685_655168416?hash=Vatz1CtFp7Er7hnZCMftbzE7BxxlwbsqcX5t8CWa25g&dl=GEZTSMBXGQ3DQNI:1674987822:hTyneu53auvTPJB7V5SJjfdZhmH5AmkJYTZruZldRjc&api=1&no_preview=1#sup1

Intelligence


File Origin
# of uploads :
209
# of downloads :
202
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-01-29 10:28:04 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Launching a process
Creating a process from a recently created file
Creating a file
Enabling the 'hidden' option for files in the %temp% directory
Сreating synchronization primitives
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Creating a window
Sending a custom TCP request
Changing a file
Reading critical registry keys
Stealing user critical data
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
advpack.dll anti-vm rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Multi AV Scanner detection for submitted file
Suspicious powershell command line found
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 793733 Sample: file.exe Startdate: 29/01/2023 Architecture: WINDOWS Score: 52 23 Multi AV Scanner detection for submitted file 2->23 7 file.exe 1 3 2->7         started        9 rundll32.exe 2->9         started        process3 process4 11 cmd.exe 2 7->11         started        file5 21 C:\Users\user\AppData\Local\...\temp.bat.exe, PE32 11->21 dropped 25 Suspicious powershell command line found 11->25 15 temp.bat.exe 8 11->15         started        17 powershell.exe 7 11->17         started        19 conhost.exe 11->19         started        signatures6 process7
Threat name:
Win32.Trojan.Privateloader
Status:
Suspicious
First seen:
2023-01-29 10:28:08 UTC
File Type:
PE (Exe)
Extracted files:
46
AV detection:
10 of 26 (38.46%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
579532a04b63aac5992010d56fa6cc982855b194d9782f5cfff3b063192a94d0
MD5 hash:
67be58406c35ca33314957be60ec7402
SHA1 hash:
691f4c4d7b8b126708fcd78b2f4b576af289640f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments