MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 60e51b2abcd368df31c8cf584c2baa059b1c6f675d07f34ba197c598a21a3d3a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA 23 File information Comments

SHA256 hash: 60e51b2abcd368df31c8cf584c2baa059b1c6f675d07f34ba197c598a21a3d3a
SHA3-384 hash: a7d025c8bbd54118c31384e8e378891ff984cbc0ff31ae52be6352b99d4e056bbd072b52f01a1b49ab8966d93cb2ba91
SHA1 hash: 600ec4d6b6795ee356811c0d83a2f61b18501e44
MD5 hash: a7351f736070a83ca40a1cc445a8f70d
humanhash: juliet-oranges-july-steak
File name:a7351f736070a83ca40a1cc445a8f70d.exe
Download: download sample
Signature RedLineStealer
File size:5'000'000 bytes
First seen:2025-05-08 23:35:21 UTC
Last seen:2025-05-09 14:40:49 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 223f8057932cb61043b0989210626737 (6 x Amadey, 4 x SVCStealer, 4 x RedLineStealer)
ssdeep 49152:kCwc2Pq/j9viTdvy0hkeYTlpl8bzdAqVVII5MYPVzR7x6bpu2sey:oR2j+t2lp+/xXpObY
TLSH T11F366B066EAC0CA8F567C27D85464506DAB1BC150360DBCFD290AE6A1F3FED15B3B722
TrID 41.1% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
26.1% (.EXE) Win64 Executable (generic) (10522/11/4)
12.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.1% (.ICL) Windows Icons Library (generic) (2059/9)
5.0% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
dhash icon f0ccf0f0f0b2d4e8 (2 x RedLineStealer, 2 x SVCStealer, 1 x XTinyLoader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
213.226.113.235:1912

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
213.226.113.235:1912 https://threatfox.abuse.ch/ioc/1518505/

Intelligence


File Origin
# of uploads :
3
# of downloads :
629
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
a7351f736070a83ca40a1cc445a8f70d.exe
Verdict:
Malicious activity
Analysis date:
2025-05-08 23:40:48 UTC
Tags:
auto-reg svcstealer stealer crypto-regex redline metastealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
infosteal emotet
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %AppData% directory
Сreating synchronization primitives
Creating a process from a recently created file
Reading critical registry keys
Creating a file
Enabling the 'hidden' option for recently created files
Creating a file in the %AppData% subdirectories
Searching for synchronization primitives
Creating a window
Launching a process
Connecting to a non-recommended domain
Connection attempt
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a system process
Enabling a "Do not show hidden files" option
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug anti-vm clipbanker explorer fingerprint fingerprint hacktool lolbin microsoft_visual_cc msiexec obfuscated overlay overlay packed packed stealer xor-pe
Result
Threat name:
MicroClip, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Benign windows process drops PE files
Changes the view of files in windows explorer (hidden files and folders)
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Creates multiple autostart registry keys
Detected generic credential text file
Found API chain indicative of debugger detection
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Joe Sandbox ML detected suspicious sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Modifies the prolog of user mode functions (user mode inline hooks)
Multi AV Scanner detection for submitted file
Opens the same file many times (likely Sandbox evasion)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected MicroClip
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1684989 Sample: xx5VumT9O3.exe Startdate: 09/05/2025 Architecture: WINDOWS Score: 100 99 diamotrix.world 2->99 135 Suricata IDS alerts for network traffic 2->135 137 Malicious sample detected (through community Yara rule) 2->137 139 Antivirus detection for URL or domain 2->139 141 7 other signatures 2->141 10 xx5VumT9O3.exe 5 2->10         started        signatures3 process4 file5 69 C:\Users\user\AppData\Roaming\yutuytt.exe, PE32+ 10->69 dropped 71 C:\Users\user\AppData\Roaming\xwxwww.exe, PE32+ 10->71 dropped 73 C:\Users\user\AppData\Roaming\bvxbvbvf.exe, PE32+ 10->73 dropped 75 C:\Users\user\AppData\Roaming\gfgfrxr.exe, PE32+ 10->75 dropped 161 Found many strings related to Crypto-Wallets (likely being stolen) 10->161 163 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->163 14 bvxbvbvf.exe 2 1 10->14         started        18 xwxwww.exe 1 2 10->18         started        20 yutuytt.exe 75 10->20         started        22 gfgfrxr.exe 10->22         started        signatures6 process7 file8 93 C:\ProgramData\ebecabcdbbbdc.exe, PE32+ 14->93 dropped 165 Found evasive API chain (may stop execution after checking mutex) 14->165 167 Contains functionality to inject threads in other processes 14->167 169 Injects code into the Windows Explorer (explorer.exe) 14->169 183 4 other signatures 14->183 24 explorer.exe 47 14 14->24 injected 29 msiexec.exe 14->29         started        95 C:\Users\user\...\CF59F07E94C23468552849.exe, PE32+ 18->95 dropped 171 Found API chain indicative of debugger detection 18->171 173 Creates multiple autostart registry keys 18->173 175 Contains functionality to inject code into remote processes 18->175 185 4 other signatures 18->185 31 msiexec.exe 8 18->31         started        97 C:\ProgramData\...\System_info.txt, ASCII 20->97 dropped 177 Tries to harvest and steal browser information (history, passwords, etc) 20->177 179 Tries to steal Crypto Currency Wallets 20->179 181 Detected generic credential text file 20->181 signatures9 process10 dnsIp11 101 92.255.57.102, 80 TELSPRU Russian Federation 24->101 103 diamotrix.world 213.226.113.53, 49701, 49705, 49706 PINDC-ASRU Russian Federation 24->103 57 C:\Users\user\AppData\Local\...\FEB5.tmp.exe, PE32+ 24->57 dropped 59 C:\Users\user\AppData\Local\...\AF37.tmp.exe, PE32 24->59 dropped 61 C:\Users\user\AppData\Local\...\DF35.tmp.exe, PE32+ 24->61 dropped 143 System process connects to network (likely due to code injection or exploit) 24->143 145 Benign windows process drops PE files 24->145 147 Creates autostart registry keys with suspicious names 24->147 159 2 other signatures 24->159 33 FEB5.tmp.exe 2 24->33         started        36 CF59F07E94C23468552849.exe 3 24->36         started        38 CF59F07E94C23468552849.exe 3 24->38         started        47 4 other processes 24->47 149 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 29->149 105 92.255.57.100, 80 TELSPRU Russian Federation 31->105 107 213.226.113.235, 1912, 49718, 49721 PINDC-ASRU Russian Federation 31->107 63 C:\Users\user\AppData\...\57A9.tmp.tdf.exe, PE32 31->63 dropped 65 C:\Users\user\AppData\...\D678.tmp.svc.exe, PE32+ 31->65 dropped 67 C:\Users\user\AppData\...\7B11.tmp.zx.exe, PE32+ 31->67 dropped 151 Found evasive API chain (may stop execution after checking mutex) 31->151 153 Changes the view of files in windows explorer (hidden files and folders) 31->153 155 Found API chain indicative of debugger detection 31->155 157 Contains functionality to inject threads in other processes 31->157 40 57A9.tmp.tdf.exe 31->40         started        42 7B11.tmp.zx.exe 31->42         started        45 D678.tmp.svc.exe 31->45         started        file12 signatures13 process14 file15 109 Found evasive API chain (may stop execution after checking mutex) 33->109 111 Found API chain indicative of debugger detection 33->111 113 Contains functionality to inject threads in other processes 33->113 115 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 33->115 117 Writes to foreign memory regions 36->117 119 Allocates memory in foreign processes 36->119 121 Modifies the context of a thread in another process (thread injection) 36->121 49 msiexec.exe 36->49         started        133 3 other signatures 38->133 51 msiexec.exe 38->51         started        123 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 40->123 125 Found many strings related to Crypto-Wallets (likely being stolen) 40->125 127 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 40->127 77 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 42->77 dropped 79 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 42->79 dropped 81 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 42->81 dropped 89 47 other files (none is malicious) 42->89 dropped 53 7B11.tmp.zx.exe 42->53         started        83 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 47->83 dropped 85 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 47->85 dropped 87 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 47->87 dropped 91 47 other files (none is malicious) 47->91 dropped 129 Tries to harvest and steal browser information (history, passwords, etc) 47->129 131 Tries to steal Crypto Currency Wallets 47->131 55 DF35.tmp.exe 47->55         started        signatures16 process17
Threat name:
Win64.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-05-06 06:26:00 UTC
File Type:
PE+ (Exe)
Extracted files:
27
AV detection:
21 of 24 (87.50%)
Threat level:
  5/5
Result
Malware family:
svcstealer
Score:
  10/10
Tags:
family:svcstealer discovery downloader persistence pyinstaller spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Browser Information Discovery
Detects Pyinstaller
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Blocklisted process makes network request
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Detects SvcStealer Payload
SvcStealer, Diamotrix
Svcstealer family
Malware Config
C2 Extraction:
176.113.115.149
185.81.68.156
Verdict:
Malicious
Tags:
Win.Malware.Tinukebot-10037263-0
YARA:
n/a
Unpacked files
SH256 hash:
60e51b2abcd368df31c8cf584c2baa059b1c6f675d07f34ba197c598a21a3d3a
MD5 hash:
a7351f736070a83ca40a1cc445a8f70d
SHA1 hash:
600ec4d6b6795ee356811c0d83a2f61b18501e44
Detections:
win_tinynuke_g0
SH256 hash:
81763f0cba84e2002b64dcc07669fe331d26cd74afc4a09adadb93fc27ad9659
MD5 hash:
b0cfd1a0c61b34bcb6cca3dc81484093
SHA1 hash:
673709268af85be08ec9fb77fd3926ab540745eb
Detections:
win_tinynuke_g0 ReflectiveLoader INDICATOR_SUSPICIOUS_ReflectiveLoader INDICATOR_SUSPICIOUS_References_SecTools
SH256 hash:
dca3daad10bd0537d0fbae871566c901e7c8cf811355b12f1be4254789d26ad7
MD5 hash:
b0ba4e937bf96218d62e4bd92ee8fea9
SHA1 hash:
c427a81045205484d892ab4c5aee7da4711ab83b
Detections:
ReflectiveLoader INDICATOR_SUSPICIOUS_ReflectiveLoader
SH256 hash:
088458f9e9e48dcf8a839cc7be6270519a761abf39c53ba99d2274c5be80d547
MD5 hash:
ed8d51bb0e96c5a7c45fedcb5e55da2d
SHA1 hash:
1a893200e3b3824ddb5aa6d7cbdc72b14c40de7f
SH256 hash:
8f2a8fff0f305a65b13bb4fb25577f7185887bb022e6bec7e74935893214a9d7
MD5 hash:
457d94bcf08a6f3ed948ec248c9170e8
SHA1 hash:
5a6cfdd2f0f3a7193603f99468ee222347cecb7c
Detections:
INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
SH256 hash:
969940fd3aa44e547ef04be793911c00f1976c7ef7d4f7ccbeab4556e0ac16d7
MD5 hash:
6869d79b526e231856a4a83d179d0c65
SHA1 hash:
cfe24f00c12e4c5b479c2788437f35cd2941b5ef
Detections:
ReflectiveLoader INDICATOR_SUSPICIOUS_ReflectiveLoader
SH256 hash:
1c271317ee5296cd87c8063ee8cc3bd1be02dc52542e651abc34b3fdfb4d9b39
MD5 hash:
225964f82c20a902ad7d3cf7e7188c6c
SHA1 hash:
80059695826fb2930705db004c5c16f99dee7af8
Detections:
ReflectiveLoader INDICATOR_SUSPICIOUS_ReflectiveLoader
SH256 hash:
cd2a4604206dfd9db0483a362c2fc64bcfeadc6296c91219902fb712d4e23811
MD5 hash:
8a14df3c35af454659bfeec8ccbcf788
SHA1 hash:
ebd3a95ec644ef0377992f1ed216b3b45a0c05cc
Detections:
ReflectiveLoader INDICATOR_SUSPICIOUS_ReflectiveLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:command_and_control
Author:CD_R0M_
Description:This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__RemoteAPI
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:INDICATOR_SUSPICIOUS_References_SecTools
Author:ditekSHen
Description:Detects executables referencing many IR and analysis tools
Rule name:INDICATOR_SUSPICIOUS_ReflectiveLoader
Author:ditekSHen
Description:Detects Reflective DLL injection artifacts
Rule name:Macos_Infostealer_Wallets_8e469ea0
Author:Elastic Security
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:ReflectiveLoader
Author:Florian Roth (Nextron Systems)
Description:Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended
Reference:Internal Research
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:svc_stealer
Author:Nikolaos 'n0t' Totosis
Description:SVC Stealer Payload
Rule name:ThreadControl__Context
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (GUARD_CF)high
Reviews
IDCapabilitiesEvidence
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteW
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA
KERNEL32.dll::GetCommandLineW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleOutputCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateFileW

Comments