MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5db1d9e50f0e0e0ba0b15920e65a1b9e3b61bcc03d5930870e0b226b600a72e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 5 File information Comments

SHA256 hash: 5db1d9e50f0e0e0ba0b15920e65a1b9e3b61bcc03d5930870e0b226b600a72e2
SHA3-384 hash: 02ae0ff0462f26f9cca69c5e25c5fa9ae81f8227672df2be0348e8c95883e91f7475d2c523fc79b4f3a5c00983b22bee
SHA1 hash: ab29f2221d590d03756d89e63cf2802ee31ecbcf
MD5 hash: f12aa4983f77ed85b3a618f7656807c2
humanhash: steak-fruit-william-queen
File name:f12aa4983f77ed85b3a618f7656807c2
Download: download sample
Signature RedLineStealer
File size:178'688 bytes
First seen:2021-06-25 07:29:53 UTC
Last seen:2021-06-25 08:37:45 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 3072:vuosgt5uZEnV79k7oPmfY44cQM2qGUhm:2orQEnV+oqxQTxU
Threatray 204 similar samples on MalwareBazaar
TLSH 3304C36773A7C475C1C42230E061CB3B2668CD271770B65AB0CABEA7BD6B14C49BC6E5
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
4.exe
Verdict:
Malicious activity
Analysis date:
2021-06-25 07:06:02 UTC
Tags:
evasion trojan loader stealer vidar rat redline danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains very large strings
Antivirus detection for dropped file
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 440387 Sample: UG1gpOODiz Startdate: 25/06/2021 Architecture: WINDOWS Score: 100 66 Multi AV Scanner detection for submitted file 2->66 68 Yara detected RedLine Stealer 2->68 70 PE file contains section with special chars 2->70 72 2 other signatures 2->72 7 UG1gpOODiz.exe 15 8 2->7         started        12 WinHoster.exe 2->12         started        14 WinHoster.exe 2->14         started        process3 dnsIp4 62 videoconvert-download38.xyz 104.21.42.63, 443, 49703 CLOUDFLARENETUS United States 7->62 64 iplogger.org 88.99.66.31, 443, 49707, 49708 HETZNER-ASDE Germany 7->64 48 C:\Users\user\AppData\Roaming\8570164.exe, PE32 7->48 dropped 50 C:\Users\user\AppData\Roaming\6703339.exe, PE32 7->50 dropped 52 C:\Users\user\AppData\Roaming\4059625.exe, PE32 7->52 dropped 54 2 other malicious files 7->54 dropped 82 May check the online IP address of the machine 7->82 84 Performs DNS queries to domains with low reputation 7->84 16 4059625.exe 15 11 7->16         started        21 8570164.exe 1 4 7->21         started        23 6703339.exe 14 2 7->23         started        25 3466394.exe 2 7->25         started        file5 signatures6 process7 dnsIp8 56 pcfixmy-download-13.xyz 172.67.222.237, 443, 49710 CLOUDFLARENETUS United States 16->56 38 C:\ProgramData\52\vcruntime140.dll, PE32 16->38 dropped 40 C:\ProgramData\52\sqlite3.dll, PE32 16->40 dropped 42 C:\ProgramData\52\softokn3.dll, PE32 16->42 dropped 46 4 other files (none is malicious) 16->46 dropped 74 Antivirus detection for dropped file 16->74 76 Multi AV Scanner detection for dropped file 16->76 78 Performs DNS queries to domains with low reputation 16->78 27 WerFault.exe 16->27         started        30 WerFault.exe 16->30         started        44 C:\Users\user\AppData\...\WinHoster.exe, PE32 21->44 dropped 80 Machine Learning detection for dropped file 21->80 32 WinHoster.exe 2 21->32         started        58 kanagannne.xyz 85.192.56.35, 49725, 80 DINET-ASRU Russian Federation 23->58 60 192.168.2.1 unknown unknown 23->60 34 WerFault.exe 25->34         started        36 WerFault.exe 25->36         started        file9 signatures10 process11 signatures12 86 Tries to evade analysis by execution special instruction which cause usermode exception 27->86 88 Antivirus detection for dropped file 32->88 90 Machine Learning detection for dropped file 32->90
Threat name:
ByteCode-MSIL.Packed.Generic
Status:
Suspicious
First seen:
2021-06-24 17:12:33 UTC
AV detection:
17 of 29 (58.62%)
Threat level:
  1/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer persistence spyware stealer
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Unpacked files
SH256 hash:
f6d25c588a08bae0577a41212e0ae6c89391b805f5e8ff009775173ade59c0da
MD5 hash:
ba35b246d111ac6fa01478a7a88b418d
SHA1 hash:
1532612b5c9ac38e946a581492f06f494e191908
SH256 hash:
5db1d9e50f0e0e0ba0b15920e65a1b9e3b61bcc03d5930870e0b226b600a72e2
MD5 hash:
f12aa4983f77ed85b3a618f7656807c2
SHA1 hash:
ab29f2221d590d03756d89e63cf2802ee31ecbcf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFu
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 5db1d9e50f0e0e0ba0b15920e65a1b9e3b61bcc03d5930870e0b226b600a72e2

(this sample)

  
Delivery method
Distributed via web download

Comments