MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 60aca841c0f1ffb29a208982c92d440cc40096466911628d7eb998902dc55527. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 2 File information Comments

SHA256 hash: 60aca841c0f1ffb29a208982c92d440cc40096466911628d7eb998902dc55527
SHA3-384 hash: c2ac3ac4a3eb3f95e043c017938ed44ef1720deea61e6610fb4cae88cb195d9102a5f558a59271ce3aaf1164a895bbf1
SHA1 hash: f52ea3e5d9c0b55dacf64228a2e1df1fd185c73c
MD5 hash: c52d689058ffc8e280817db7f93eb9ce
humanhash: happy-butter-march-golf
File name:f52ea3e5d9c0b55dacf64228a2e1df1fd185c73c.exe
Download: download sample
Signature RedLineStealer
File size:425'472 bytes
First seen:2024-11-11 16:52:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 0301c97692eb66d40eb60ddb80bc0b65 (11 x RedLineStealer, 3 x Rhadamanthys, 1 x Amadey)
ssdeep 6144:+lTbcBgnfPGIgAce1xDFrIWjuTVCBK+ww6xXwvRt6MdNU1:gTASfPGC9DrIPVQ3wwOXwvvdN
TLSH T176946C53A2E13D44EA268BBA9F1FC6EC770DF2A08F49376D12199E1F04B1172D263B51
TrID 46.6% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
25.2% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
8.5% (.EXE) Win64 Executable (generic) (10522/11/4)
5.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
File icon (PE):PE icon
dhash icon 0018988080888280 (4 x RedLineStealer)
Reporter NDA0E
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
419
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f52ea3e5d9c0b55dacf64228a2e1df1fd185c73c.exe
Verdict:
Suspicious activity
Analysis date:
2024-11-11 18:23:27 UTC
Tags:
netreactor confuser

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
virus gates agent
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Connection attempt to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
fingerprint microsoft_visual_cc packed packed packer_detected
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
PureLog Stealer, RedLine
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Emotet
Status:
Malicious
First seen:
2024-11-11 07:41:52 UTC
File Type:
PE (Exe)
Extracted files:
70
AV detection:
31 of 38 (81.58%)
Threat level:
  5/5
Verdict:
malicious
Label(s):
shellcode_loader_002 unknown_loader_001
Similar samples:
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer
Behaviour
Suspicious use of AdjustPrivilegeToken
System Location Discovery: System Language Discovery
RedLine
RedLine payload
Redline family
Verdict:
Malicious
Tags:
Win.Packer.pkr_ce1a-9980177-0
YARA:
n/a
Unpacked files
SH256 hash:
3323bc351c9f930cc8b60bd7ecc2ad059207a331ae982412502412b648362d0f
MD5 hash:
9831484fcd1f515d4d84f5caf1ef887c
SHA1 hash:
b330876a2d7b091b8452d068f3244b279f5c4a76
Detections:
redline MetaStealer MALWARE_Win_RedLine SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24 MALWARE_Win_MetaStealer INDICATOR_EXE_Packed_ConfuserEx RedLine_Campaign_June2021
SH256 hash:
f662fedca5ee7969e3cf92e4ec2484dbb6f1ad1791a5f122855a39c20a446693
MD5 hash:
7d43405cf2cda076e5a1a4e430173d2e
SHA1 hash:
79237c04efe8afb26c7b2a49eb5aaa06d1182f72
Detections:
win_samsam_auto MAL_Malware_Imphash_Mar23_1 MetaStealer_NET_Reactor_packer MALWARE_Win_RedLine SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
60aca841c0f1ffb29a208982c92d440cc40096466911628d7eb998902dc55527
MD5 hash:
c52d689058ffc8e280817db7f93eb9ce
SHA1 hash:
f52ea3e5d9c0b55dacf64228a2e1df1fd185c73c
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::FindNextVolumeW
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::GetStartupInfoA
KERNEL32.dll::GetDiskFreeSpaceExW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AddConsoleAliasW
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetConsoleCursorInfo
KERNEL32.dll::GetConsoleAliasesA
KERNEL32.dll::GetConsoleTitleA
KERNEL32.dll::GetConsoleAliasExesW
KERNEL32.dll::GetConsoleFontSize
KERNEL32.dll::GetConsoleTitleW
KERNEL32.dll::GetConsoleAliasA
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::GetWindowsDirectoryA
KERNEL32.dll::RemoveDirectoryA
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
KERNEL32.dll::QueryDosDeviceA

Comments