MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64edbaff99fe8c87c2f5f826b0d1741c575295e3ab0c3d16db8bbacd2baebd30. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 4 File information Comments

SHA256 hash: 64edbaff99fe8c87c2f5f826b0d1741c575295e3ab0c3d16db8bbacd2baebd30
SHA3-384 hash: 3de9b1138ce47b04b002607ef1aa4f6e96ed7c75f543bef407e26f91d1ea7bfca41c0456426e6dc4537b6ab49a312863
SHA1 hash: ae3e372ab93ede715e3a97910151f2cbed4402f2
MD5 hash: 245e6af16b2347e47ed5b04fdbb178b4
humanhash: nuts-timing-zulu-dakota
File name:245E6AF16B2347E47ED5B04FDBB178B4.exe
Download: download sample
Signature RedLineStealer
File size:4'400'000 bytes
First seen:2021-12-21 19:46:22 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e48cc266501c282987b27f2c1f654e2d (52 x RedLineStealer, 3 x RaccoonStealer)
ssdeep 98304:h7Kh+Kn7/+5AOBv80prA1AOZYiF5zWuRQgb+gzXyRl:heoKnqBjKZYmygjX4l
TLSH T11F1633AE4A65C248CD38CBB07B4B1456A1B027DF839BDD559B3CA75C06DAF9C8384C1B
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
5.206.227.11:63730

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
5.206.227.11:63730 https://threatfox.abuse.ch/ioc/280483/

Intelligence


File Origin
# of uploads :
1
# of downloads :
192
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
245E6AF16B2347E47ED5B04FDBB178B4.exe
Verdict:
Malicious activity
Analysis date:
2021-12-21 19:47:39 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a window
Sending a custom TCP request
DNS request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Running batch commands
Stealing user critical data
Blocking the Windows Defender launch
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Phoenix Miner RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Phoenix Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 543650 Sample: ujG68PMRfv.exe Startdate: 21/12/2021 Architecture: WINDOWS Score: 100 136 Antivirus detection for dropped file 2->136 138 Multi AV Scanner detection for dropped file 2->138 140 Multi AV Scanner detection for submitted file 2->140 142 8 other signatures 2->142 9 ujG68PMRfv.exe 2->9         started        12 RegHost.exe 1 17 2->12         started        15 RegHost.exe 2->15         started        17 RegHost.exe 2->17         started        process3 dnsIp4 154 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->154 156 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 9->156 158 Writes to foreign memory regions 9->158 168 2 other signatures 9->168 19 AppLaunch.exe 15 7 9->19         started        24 WerFault.exe 23 9 9->24         started        122 raw.githubusercontent.com 12->122 124 github.com 12->124 160 Multi AV Scanner detection for dropped file 12->160 162 Detected unpacking (changes PE section rights) 12->162 164 Detected unpacking (overwrites its own PE header) 12->164 170 3 other signatures 12->170 26 explorer.exe 12->26         started        28 bfsvc.exe 12->28         started        30 cmd.exe 12->30         started        34 2 other processes 12->34 126 185.199.108.133, 443, 49803, 49806 FASTLYUS Netherlands 15->126 128 raw.githubusercontent.com 15->128 130 github.com 15->130 166 Hides threads from debuggers 15->166 32 cmd.exe 15->32         started        36 2 other processes 15->36 132 raw.githubusercontent.com 17->132 134 github.com 17->134 38 2 other processes 17->38 signatures5 process6 dnsIp7 102 github.com 140.82.121.4, 443, 49756, 49779 GITHUBUS United States 19->102 104 raw.githubusercontent.com 185.199.111.133, 443, 49757, 49762 FASTLYUS Netherlands 19->104 106 5.206.227.11, 49751, 63730 DOTSIPT Portugal 19->106 86 C:\Users\user\AppData\Local\Temp\a.exe, PE32+ 19->86 dropped 144 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->144 146 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->146 148 Tries to harvest and steal browser information (history, passwords, etc) 19->148 150 Tries to steal Crypto Currency Wallets 19->150 40 a.exe 1 22 19->40         started        108 192.168.2.1 unknown unknown 24->108 88 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 24->88 dropped 45 RegHost.exe 26->45         started        152 Hides threads from debuggers 28->152 47 conhost.exe 28->47         started        49 7z.exe 30->49         started        51 conhost.exe 30->51         started        53 2 other processes 32->53 55 2 other processes 34->55 57 2 other processes 36->57 59 2 other processes 38->59 file8 signatures9 process10 dnsIp11 110 140.82.121.3, 443, 49760, 49761 GITHUBUS United States 40->110 112 raw.githubusercontent.com 40->112 114 github.com 40->114 90 C:\Users\user\AppData\Roaming\...\RegHost.exe, PE32+ 40->90 dropped 92 C:\Users\user\AppData\Roaming\...\7z.exe, PE32+ 40->92 dropped 94 C:\Users\user\AppData\Roaming\...\7z.dll, PE32+ 40->94 dropped 100 2 other files (none is malicious) 40->100 dropped 172 Multi AV Scanner detection for dropped file 40->172 174 Detected unpacking (overwrites its own PE header) 40->174 176 Machine Learning detection for dropped file 40->176 61 cmd.exe 1 40->61         started        63 cmd.exe 40->63         started        65 cmd.exe 40->65         started        71 2 other processes 40->71 116 raw.githubusercontent.com 45->116 118 github.com 45->118 178 Hides threads from debuggers 45->178 67 cmd.exe 45->67         started        69 conhost.exe 45->69         started        96 C:\Users\user\AppData\...\RegHost_Temp.exe, PE32+ 49->96 dropped 98 C:\Users\user\AppData\...\RegData_Temp.exe, PE32+ 55->98 dropped file12 signatures13 process14 process15 73 curl.exe 1 61->73         started        76 conhost.exe 61->76         started        78 conhost.exe 63->78         started        80 7z.exe 63->80         started        82 conhost.exe 65->82         started        84 conhost.exe 67->84         started        dnsIp16 120 api.telegram.org 149.154.167.220, 443, 49758 TELEGRAMRU United Kingdom 73->120
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-12-19 07:49:50 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
23 of 43 (53.49%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Unpacked files
SH256 hash:
838549fd76c00fd6123d84f91b28be329b4221a82ff240df19be370a725295c7
MD5 hash:
03bb668b05d8dc4a9b639aa392f3b5fc
SHA1 hash:
04ea85a5bb883aa9333d1772e4179c7e888f26f2
SH256 hash:
64edbaff99fe8c87c2f5f826b0d1741c575295e3ab0c3d16db8bbacd2baebd30
MD5 hash:
245e6af16b2347e47ed5b04fdbb178b4
SHA1 hash:
ae3e372ab93ede715e3a97910151f2cbed4402f2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments