MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58aefdd7d14c182333302011d4cb5382e694d06b263e0254d37d8789b95c58d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 3


Intelligence 3 IOCs 1 YARA 4 File information Comments

SHA256 hash: 58aefdd7d14c182333302011d4cb5382e694d06b263e0254d37d8789b95c58d5
SHA3-384 hash: 3c63fa3315cbf8e1e659855caac5cb433e5042e2a1a57eb3214d7799974697c6fd00ab9ba2d83eb46b8fb2afb1ecba76
SHA1 hash: 87b7942d5870d624110ab92ce73b5956a09eef88
MD5 hash: d5872e01c0af32724029ebc126dcbba1
humanhash: lion-yankee-may-six
File name:Apocalypse-beta 0.24.rar
Download: download sample
Signature RedLineStealer
File size:5'000'715 bytes
First seen:2022-12-01 12:18:40 UTC
Last seen:Never
File type: rar
MIME type:application/x-rar
Note:This file is a password protected archive. The password is: almv1122
ssdeep 98304:8TrdUUGh5wCwH8qILau5x8tJlR3f4c95th+EPuW4dlfYj5W4GrIWE:sdoVwH8qIeKeJlxl5ZPuf1lrpE
TLSH T1493633C4350D1DAB847E386FB882E1C44CBEBC275361641A9B5D9BBEBD436DF0269309
TrID 61.5% (.RAR) RAR compressed archive (v5.0) (8000/1)
38.4% (.RAR) RAR compressed archive (gen) (5000/1)
Reporter iamdeadlyz
Tags:exe FakeKOTA file-pumped pw almv1122 rar RedLineStealer


Avatar
Iamdeadlyz
From apocalypse.cool (impersonation of kidsoftheapocalypse.com)
RedLineStealer C&C: 79.137.199.206:45354

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
79.137.199.206:45354 https://threatfox.abuse.ch/ioc/1011812/

Intelligence


File Origin
# of uploads :
1
# of downloads :
211
Origin country :
n/a
File Archive Information

This file archive contains 6 file(s), sorted by their relevance:

File name:re_dlc_stm_1456363.pak
File size:4'344 bytes
SHA256 hash: 8c0a7c99cce74455012a433172c970f61217f901280126cfab236bd8a8449ef4
MD5 hash: ec4a27400fae25959eef48616ee5b04f
MIME type:application/octet-stream
Signature RedLineStealer
File name:config_default.ini
File size:686 bytes
SHA256 hash: 7ceebf809a21408755c46c917e5b7229b6f3c06544a3d0c4263fed702d689fd8
MD5 hash: 2312694d431b73d0e2bc4af35bf9aa85
MIME type:application/x-wine-extension-ini
Signature RedLineStealer
File name:re_dlc_stm_1456362.pak
File size:804'371 bytes
SHA256 hash: bf697e8828f078ac623011b4d323662c5025c2a3e594db31a7cc2e28f476bb18
MD5 hash: cafddf8e2fe191adf0a683b3c65a60ee
MIME type:application/octet-stream
Signature RedLineStealer
File name:config.ini
File size:30'589 bytes
SHA256 hash: 151bd4b8d1ae7952b0c6f41a57763a929106c6ab85d4b2fe5a3e90cf69a322d2
MD5 hash: cdbb0130e0007d81e2e4c0b0917cf9f7
MIME type:application/x-wine-extension-ini
Signature RedLineStealer
File name:amd_ags_x64.dll
File size:42'496 bytes
SHA256 hash: 298b40fb70c142cc61135a125ff6c2a2e474526b9a7045102666a9434e84f459
MD5 hash: 00d9c1f1485c9c965c53f1aa5448412b
MIME type:application/x-dosexec
Signature RedLineStealer
File name:Apocalypse Launcher 0.24.exe
Pumped file This file is pumped. MalwareBazaar has de-pumped it.
File size:774'745'600 bytes
SHA256 hash: ab4c43151c0bbb594180e917b5672dedd5c78e7dc98abc3a3a77d94a0db83df0
MD5 hash: 2cf2ccd4b113bd248c5d8245f7bea9ef
De-pumped file size:4'356'608 bytes (Vs. original size of 774'745'600 bytes)
De-pumped SHA256 hash: 90b902a384f7b3da868569a30cbebf140a895fcf028653dfbfb90f5fa6d0d21e
De-pumped MD5 hash: 277a2ef50b2879fe39489b613d9f6667
MIME type:application/x-dosexec
Signature RedLineStealer
Vendor Threat Intelligence
Gathering data
Result
Verdict:
UNKNOWN
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:pro infostealer spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
RedLine
Malware Config
C2 Extraction:
79.137.199.206:45354
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

rar 58aefdd7d14c182333302011d4cb5382e694d06b263e0254d37d8789b95c58d5

(this sample)

ab4c43151c0bbb594180e917b5672dedd5c78e7dc98abc3a3a77d94a0db83df0

  
Dropping
SHA256 ab4c43151c0bbb594180e917b5672dedd5c78e7dc98abc3a3a77d94a0db83df0
  
Delivery method
Distributed via web download

Comments