MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5bbc9cae00c327809697d18a151efa7ed1520837fa1aed78e7457940b7156057. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 6 File information Comments

SHA256 hash: 5bbc9cae00c327809697d18a151efa7ed1520837fa1aed78e7457940b7156057
SHA3-384 hash: 67cc0aea35e0e3ed0a14f171f8d0f106c55e19a4900df546f49c5e075a4e57955ec11d890fdfe74497ab42e10a5495e2
SHA1 hash: 6216e6952135e5bf939d40a876875525f0724ff2
MD5 hash: b493effef31e1dc2e99a7fade0932f29
humanhash: pluto-stream-sixteen-autumn
File name:77809VN.exe
Download: download sample
Signature RedLineStealer
File size:357'363 bytes
First seen:2022-02-10 08:31:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 099c0646ea7282d232219f8807883be0 (476 x Formbook, 210 x Loki, 107 x AgentTesla)
ssdeep 6144:owoe+6jONHt+iNqgMFhAS5D8WTERPPQxjN1aOWUh7EfIDY2ap9yY1H9/lWXNVpX:P+MuHta/uSPwR3Qxjr1YrTlsjX
Threatray 4'448 similar samples on MalwareBazaar
TLSH T15774236178C34CABD8A0A17247D2435CC7FED7251DE0AE0317909EBAB962B9724863CD
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
176.31.159.199:16172

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
176.31.159.199:16172 https://threatfox.abuse.ch/ioc/384863/

Intelligence


File Origin
# of uploads :
1
# of downloads :
233
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
DNS request
Sending an HTTP POST request
Sending a custom TCP request
Reading critical registry keys
Using the Windows Management Instrumentation requests
Creating a file
Creating a file in the %temp% directory
Unauthorized injection to a recently created process by context flags manipulation
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
control.exe overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Nsisx
Status:
Malicious
First seen:
2022-02-10 08:32:08 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
6 of 43 (13.95%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Unpacked files
SH256 hash:
825b3ac928a0a91217328330d7daef01b90758728364998a9a05f9f5f334e154
MD5 hash:
9934cdb6bbb56503a8d2cb2a644fba2e
SHA1 hash:
c7615268830f064190c3631f7c922f9d6fbe6aa4
SH256 hash:
2b8018697a5ea422243a67f143bbe3ac34368ba3027e0621218913bed7807fa8
MD5 hash:
0fe3f23abd654b22c7891a45f1b00426
SHA1 hash:
c39a100102b3caa08a1a86001a2e3fde4b4d4c4a
SH256 hash:
a5c08e22a176ffcbd5323e8f13b5b5cb3d6bb0d0c004352e9e641b1afb1c837e
MD5 hash:
dca1caeeef9c3c8c5d6622ee3733cd33
SHA1 hash:
5610367477e3c14e3448b70baa4debc298e1830f
SH256 hash:
5bbc9cae00c327809697d18a151efa7ed1520837fa1aed78e7457940b7156057
MD5 hash:
b493effef31e1dc2e99a7fade0932f29
SHA1 hash:
6216e6952135e5bf939d40a876875525f0724ff2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:RedLine_a
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments