MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 60e40ccfc16ca9f36dee7ec2b4e2fc81398ff408bf7cc63fb7ddf0fef1d4b72b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 10 File information Comments

SHA256 hash: 60e40ccfc16ca9f36dee7ec2b4e2fc81398ff408bf7cc63fb7ddf0fef1d4b72b
SHA3-384 hash: 3039a5b95183bdf2bc28da50a10929d19c77fc2b0ab6834af3193d3fa8ea842f9b9509ca953ac7415b7c9c1675b97c6d
SHA1 hash: 143fd1030ea0a697bdce2948cf4998a72ab50f22
MD5 hash: 712bd2a4e83d7715b02fe28b0eb93ea9
humanhash: pizza-berlin-kentucky-texas
File name:60E40CCFC16CA9F36DEE7EC2B4E2FC81398FF408BF7CC.exe
Download: download sample
Signature RedLineStealer
File size:1'193'712 bytes
First seen:2022-02-12 11:05:30 UTC
Last seen:2022-02-12 13:01:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 24576:wXjWosPwHXaZDOCKKmiqkcW0sVyoVqQQ:CzbGDOCKKmiqkcW08V
Threatray 2'382 similar samples on MalwareBazaar
TLSH T14E4549103094C949D7666739DE9A60F013BC8E82D121922B795C7FC83FF2729653BFA9
File icon (PE):PE icon
dhash icon 71e8ec8686cce871 (1 x RedLineStealer)
Reporter abuse_ch
Tags:BOSCH BOSCH SDS-plus Professional 607557501 exe RedLineStealer signed

Code Signing Certificate

Organisation:BOSCH BOSCH SDS-plus Professional 607557501
Issuer:BOSCH BOSCH SDS-plus Professional 607557501
Algorithm:sha1WithRSAEncryption
Valid from:2021-05-20T11:21:28Z
Valid to:2031-05-21T11:21:28Z
Serial number: 72763457ef50d5b04e00b374abc6ff11
Thumbprint Algorithm:SHA256
Thumbprint: 21bf21ae43c04ae695102f55f16e0d6521616f383543826b607a3f3d70a3f867
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
RedLineStealer C2:
194.67.71.103:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
194.67.71.103:80 https://threatfox.abuse.ch/ioc/387245/

Intelligence


File Origin
# of uploads :
2
# of downloads :
348
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
60E40CCFC16CA9F36DEE7EC2B4E2FC81398FF408BF7CC.exe
Verdict:
Malicious activity
Analysis date:
2022-02-12 11:47:48 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Сreating synchronization primitives
Sending a custom TCP request
Query of malicious DNS domain
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm fingerprint hacktool obfuscated overlay packed packed replace.exe stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found Tor onion address
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Infostealer.Reline
Status:
Malicious
First seen:
2021-05-22 11:25:43 UTC
File Type:
PE (.Net Exe)
Extracted files:
106
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline infostealer
Behaviour
Checks processor information in registry
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Drops file in Windows directory
RedLine
RedLine Payload
Unpacked files
SH256 hash:
60e40ccfc16ca9f36dee7ec2b4e2fc81398ff408bf7cc63fb7ddf0fef1d4b72b
MD5 hash:
712bd2a4e83d7715b02fe28b0eb93ea9
SHA1 hash:
143fd1030ea0a697bdce2948cf4998a72ab50f22
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:downloader_macros
Author:ddvvmmzz
Description:downloader macros
Rule name:exec_macros
Author:ddvvmmzz
Description:exec macros
Rule name:grakate_stealer_nov_2021
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:obfuscate_macros
Author:ddvvmmzz
Description:obfuscate macros
Rule name:pe_imphash
Rule name:RedLine_a
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_mem
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8/
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments