MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5cba91d402d617686ac0520d932273d36145c787de8a2701107ad09a1611af18. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs 1 YARA 5 File information Comments

SHA256 hash: 5cba91d402d617686ac0520d932273d36145c787de8a2701107ad09a1611af18
SHA3-384 hash: d869db437691b486399c995aee3d1d88f7a9b6e750fa6239e4d50b7fc578c68a58c8d2bcf26cfcafae3262ffffd6b7c0
SHA1 hash: d6571de0753e73907a8467ee23ca8e349794be2d
MD5 hash: 7afe13cb0b2c04250f7abf8d6a802977
humanhash: arizona-two-black-mockingbird
File name:RFQASTM36QTY1000MTOrder.exe
Download: download sample
Signature RedLineStealer
File size:1'542'459 bytes
First seen:2024-09-16 12:25:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d3bf8a7746a8d1ee8f6e5960c3f69378 (247 x Formbook, 75 x AgentTesla, 64 x SnakeKeylogger)
ssdeep 24576:uRmJkcoQricOIQxiZY1iaCGpn7OtXVaw9FK5Hpz4lGKT8VdDSsL:7JZoQrbTFZY1iaCEOtXVBFkJMGKo1SsL
TLSH T10D65F122F5D68036C2B327B19E7EF76A9A3D69360327C2D727C41D314EA05416B2A773
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4504/4/1)
Magika pebin
File icon (PE):PE icon
dhash icon b150b26869b2d471 (468 x Formbook, 101 x RedLineStealer, 94 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
204.10.160.212:28798

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
204.10.160.212:28798 https://threatfox.abuse.ch/ioc/1325269/

Intelligence


File Origin
# of uploads :
1
# of downloads :
434
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
RFQASTM36QTY1000MTOrder.exe
Verdict:
Malicious activity
Analysis date:
2024-09-17 07:55:37 UTC
Tags:
stealer redline metastealer netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
Encryption Network Stealth Trojan Redlinesteal
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit epmicrosoft_visual_cc fingerprint keylogger lolbin masquerade microsoft_visual_cc overlay packed shell32
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1511847 Sample: RFQASTM36QTY1000MTOrder.exe Startdate: 16/09/2024 Architecture: WINDOWS Score: 100 42 56.126.166.20.in-addr.arpa 2->42 58 Suricata IDS alerts for network traffic 2->58 60 Found malware configuration 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 9 other signatures 2->64 10 RFQASTM36QTY1000MTOrder.exe 3 2->10         started        13 wscript.exe 1 2->13         started        signatures3 process4 file5 40 C:\Users\user\AppData\Local\...\name.exe, PE32 10->40 dropped 16 name.exe 1 10->16         started        80 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->80 20 name.exe 13->20         started        signatures6 process7 file8 38 C:\Users\user\AppData\Roaming\...\name.vbs, data 16->38 dropped 46 Multi AV Scanner detection for dropped file 16->46 48 Machine Learning detection for dropped file 16->48 50 Drops VBS files to the startup folder 16->50 52 Switches to a custom stack to bypass stack traces 16->52 22 name.exe 16->22         started        24 RegSvcs.exe 16->24         started        54 Writes to foreign memory regions 20->54 56 Maps a DLL or memory area into another process 20->56 27 RegSvcs.exe 5 2 20->27         started        signatures9 process10 signatures11 29 name.exe 22->29         started        32 RegSvcs.exe 22->32         started        70 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 24->70 72 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 24->72 74 Found many strings related to Crypto-Wallets (likely being stolen) 27->74 76 Tries to harvest and steal browser information (history, passwords, etc) 27->76 78 Tries to steal Crypto Currency Wallets 27->78 process12 signatures13 82 Writes to foreign memory regions 29->82 84 Maps a DLL or memory area into another process 29->84 34 RegSvcs.exe 5 4 29->34         started        process14 dnsIp15 44 204.10.160.212, 28798, 49711, 49713 UNREAL-SERVERSUS Canada 34->44 66 Found many strings related to Crypto-Wallets (likely being stolen) 34->66 68 Tries to steal Crypto Currency Wallets 34->68 signatures16
Threat name:
Win32.Worm.DorkBot
Status:
Malicious
First seen:
2024-09-16 12:19:43 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:success credential_access discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
AutoIT Executable
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Drops startup file
Executes dropped EXE
Loads dropped DLL
Credentials from Password Stores: Credentials from Web Browsers
RedLine
RedLine payload
Malware Config
C2 Extraction:
204.10.160.212:28798
Unpacked files
SH256 hash:
7501754d9f3425e333463c9b1b3638602d9e442421331455ce19ab44691646be
MD5 hash:
d9dd0fc14e216bb3ddd9bf3026513c82
SHA1 hash:
2cf7b343c035173fc0210975f84c6bb3e366858e
Detections:
redline SUSP_OBF_NET_Reactor_Indicators_Jan24 MALWARE_Win_MetaStealer
SH256 hash:
b4519a1e731d9818093d5e9a75a5b50f7adb2121b8c1f047dff45bd901e43eaf
MD5 hash:
bbe48cf9ededea93bee82f75a54d75e7
SHA1 hash:
215f88a0d8075b2c3094299a8c92966d96096b58
Detections:
redline SUSP_OBF_NET_Reactor_Indicators_Jan24 MALWARE_Win_MetaStealer RedLine_Campaign_June2021
SH256 hash:
50f6dd06bdb9897cc98af15ef5beacb2a1bedbfe86f47d36fa537b7403ecdaf0
MD5 hash:
472590d7b0df9bad8c7d352eb5afb8c9
SHA1 hash:
9d188d2168c6fa8488d9e6d1d68a37807b67aee4
Detections:
win_samsam_auto MAL_Malware_Imphash_Mar23_1 SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
5cba91d402d617686ac0520d932273d36145c787de8a2701107ad09a1611af18
MD5 hash:
7afe13cb0b2c04250f7abf8d6a802977
SHA1 hash:
d6571de0753e73907a8467ee23ca8e349794be2d
Detections:
AutoIT_Compiled
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AutoIt
Author:Jean-Philippe Teissier / @Jipe_
Description:AutoIT packer
Rule name:AutoIT_Compiled
Author:@bartblaze
Description:Identifies compiled AutoIT script (as EXE). This rule by itself does NOT necessarily mean the detected file is malicious.
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::CopySid
ADVAPI32.dll::GetLengthSid
ADVAPI32.dll::GetAce
USER32.dll::GetUserObjectSecurity
ADVAPI32.dll::InitializeAcl
ADVAPI32.dll::InitializeSecurityDescriptor
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoCreateInstanceEx
ole32.dll::CoInitializeSecurity
ole32.dll::CreateStreamOnHGlobal
MULTIMEDIA_APICan Play MultimediaWINMM.dll::mciSendStringW
WINMM.dll::timeGetTime
WINMM.dll::waveOutSetVolume
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAce
ADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetSecurityDescriptorDacl
ADVAPI32.dll::GetTokenInformation
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::CreateProcessWithLogonW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::SetSystemPowerState
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetDriveTypeW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LogonUserW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2W
MPR.dll::WNetUseConnectionW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegConnectRegistryW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_SVC_APICan Manipulate Windows ServicesADVAPI32.dll::OpenSCManagerW
ADVAPI32.dll::UnlockServiceDatabase
WIN_USER_APIPerforms GUI ActionsUSER32.dll::BlockInput
USER32.dll::CloseDesktop
USER32.dll::CreateMenu
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::FindWindowW

Comments