MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6817f5bc2c65ce63767514f18c3f1a78dae713876cdae0f79b5cc1e55de71799. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: 6817f5bc2c65ce63767514f18c3f1a78dae713876cdae0f79b5cc1e55de71799
SHA3-384 hash: 233fce7bd0bb46d0e227c49a80a3dc9c0bcb75cfce256ea16a7ce1543923d030cd78bf5ae640f90ac841972c9c796f7a
SHA1 hash: 3c7b8a6d358b6d2ccf67372dbf2d4b2e72d4b083
MD5 hash: f7a07edb960489f4c5f23379b1f238e6
humanhash: spring-earth-arizona-sweet
File name:file
Download: download sample
Signature RedLineStealer
File size:337'344 bytes
First seen:2022-11-17 13:22:16 UTC
Last seen:2022-11-17 13:41:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8f3ac9a31bed02247930b8a0bb86e691 (1 x Amadey, 1 x RedLineStealer, 1 x DanaBot)
ssdeep 6144:C0h0j1RqdxE8A8e/G5yy/oeRYJkKKWe1fN:C1j14RiG5yreKJBKp1
Threatray 11'583 similar samples on MalwareBazaar
TLSH T13E7402113AA1D032D7A348708DB5D3A1AE3FB7B235F4855BB7A446986E607C36F29307
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 2b178e4da64e2b33 (1 x RedLineStealer)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://193.106.191.27/MicrosoftKeys.exe

Intelligence


File Origin
# of uploads :
10
# of downloads :
196
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-11-17 13:24:07 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connecting to a non-recommended domain
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Launching the default Windows debugger (dwwin.exe)
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2022-11-17 13:23:07 UTC
File Type:
PE (Exe)
Extracted files:
10
AV detection:
22 of 25 (88.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:dozkey discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Checks installed software on the system
Accesses cryptocurrency files/wallets, possible credential harvesting
Reads user/profile data of web browsers
RedLine
Malware Config
C2 Extraction:
193.106.191.30:47242
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
f9c52111ffe261b94da8b96278152b988aedd15f6ac939519f63d179a91305d0
MD5 hash:
d1824b431367ee3bd6b56a82a5f3a722
SHA1 hash:
ac9459eb5a25c1426844b09100c61b4dc9957476
SH256 hash:
cfc4f7340df2681941fe68d8112c29125ceba8bb26311e0ae7f9c732ddc1c4ac
MD5 hash:
c4031dca5885b1f0e70ac9447f63a0f0
SHA1 hash:
3140c555975a691fb89bf0a1b093984df3899a7a
Detections:
redline
SH256 hash:
8710af070ebed089a686d048266f352643b7913e3cf06632ff5f2a72f57c631f
MD5 hash:
2b8ceeccc677efd4b5f7c08cb4c77669
SHA1 hash:
11f787f4b882def1f0838554aa5460393ad922d7
Detections:
redline
Parent samples :
af29edc2d7bf569d5bef55e69504da3c6404c7df7b10d3145faf6d6d31e347ea
6817f5bc2c65ce63767514f18c3f1a78dae713876cdae0f79b5cc1e55de71799
9cc5b5b9f77b61631e3e85e834b22e4b1685a6d43dc3b1c813b879e263b4a438
5c51b93c1c6c3417222b12f14d7182d2f6892da208bd363ceb8487d23c7d8361
0e056e7006718f2df48cb25367ad37976f514ac447ceacbd0e41fe1a7ba0fec0
1e1c1160f517a2e9186861a2e2bb104fa33711c7d7f40f04cda721f50d62df5f
474b857a9ae1d311198c37c13617c00b1d111f3f2a1a462aaef75dda5a9e37d1
9de65be7854aa8dd5431e5633ce0a8844fe9e688f2a79bac6ffff076757adca2
24847bc703b9e0c27313a537c53a51757fded4d1179556a0ae5c1af39927134b
b10008bb099f081741456daf29af0a24934b4828e4071e934c3ebdf2d600fd71
eb452bc0241954ff78b9780c4710f5657ab3bbddd8ba2316afe13379ed86ea3c
97b4110323e2aab7ab3c10be8f06d18e65cbfafbbe87f5ee77dc8cc42f150b5a
44ae9f2c44267535f54270ed2c4d03f937f40a524566c5f8ebd1876b937a503a
de53065c8fe0e17ab1b9875ad9d4bbefdf3ee2f749326bc5793f2da509f17da5
50da69523a08e478018c6534dbf295c6d3d8df9715eee58ea2555ea499c3a2fc
64e9f03e59e64fe9a95a9966f0b4550a6f2c99ad99a08d45a0c79d383d720d1d
369f8d75c0b2934f02ccac05557fd46e00b34bf2e8b793939b0ee32813385fe7
de093f8b734075fb4d4529df0b50149e791f6ccc3d927a28d610dbcd2ed73ee2
14d5376e3237559a314402aec6e3ab605304d32f3842d75fe2eda0e836688b8c
b4db22da0f2afe09c61703ba7f011fcc6be2d9162df29c23f5643ee301f069e2
4ad1b4779ea5af32de8b22fd966b7a9bb3929d091e9e61c35c7b25d5c1b1b550
4aa2fb304cd3142f4332e1df78fb05c9fcfc9cf4c45a4b4313e1ab3d8c196cf3
de5a55573afe040af55517efbd83afc4c686e8c707fbec6ccdf8cdfdf39077dc
88a6579adeafcfb7ed5c9bcd054253ca0c33a2158624cf73c3f528e16add5f1e
c8bf9f62050fd5ea2b05756d42aa309b142fda4109b2bba7d7d0b0bb8e2db289
befb72b0133ceb62aebbc2cb3cec399f89b3a99f6cb163d494f1176685ed19fc
e98edce318f2ee5d241b87ca9305f8ed72cc8eb5a21757d8430c4152d0a47c87
049b29396a93de08a9a598a8dff3cc39bb2fc1188ab568b90447c79fe079d31c
2a7b4330b0f92e2f07a053d2e4da5bd28de34e736c37ca7d799642519f6a6ef5
3e79825ebc2073617eac207ffaf639a4dd97f7436b4b25b7226617adc59b689e
9f802a2ecff20f749a93b197cb18ae6b67eeca85b12f801f3d5de0bae0c54066
d7b731af07c7cd86b2d25c314ef0bff43e3c935daddc6d6d60a2efb8c3fa91c7
fae696911780d0bf4fc2a2a6ddee82b26fca9bfe92a8908051c8945d97ceb4e7
db266ea1e5adb4a44965e8becef1d1ad7b41ba48d45afeff56aa2f229e16f165
3d68b1e6c89a05f0ccdc50ca3144123c736c31bc818e5078258028abb59401c2
cc8321982633efd133f144be8c2d287462dc8faf858fceccc7f4722544b3a749
9cb696bee3960c077367c53ee76957cb904b2888029e0188a28e71b809600153
90881c224d77520a4cffb5ff0dca516bc22474fe3eb8aecd565a08c9eee54f3f
614e1692785d9958b1cedba4ba648f3a5ba971100e3c89df9b12cf80a68100c0
a7195b4af46ea73c5ee41a67672c75d1c3204be7534251b59bab04bb18f4a8d2
47132890ae330f4d234910177cedd8c55f2e2221318708c0957abbe723092efe
53b4f1f0c960519ef57056d3ec9206701ed03f8076bcdab819fd033b66a48970
99d3e8e677488bed6f7ab10988da7eff0abc3032659aa1306951d9e60dcd1524
5bf5b424ba0cedbcf47b4ea6830071903ffec54b3e84900bce043ebc3b7e11ec
6bc8101e00a14f8ddab14d986ab1fd0eeaa9a69f10f73697edbae8b2e1bdcbf3
efd6e59196f1b2d66a4d9e36e9c64024c28dc4f5c88fcd047d1acf15a69b7bef
051c7fd0c329d57420826e84e0ff7888f7a2ea91176e1a39a5139a6422bb117e
e51d7948a04eb3088f904b424b15405ed335fb86638a299fd4b07da25e65f0bc
adea78b4c7b6b76b80e581b55f082cc6df741b0e450706d3e10922589a604d7e
f29190f00b2eb1f1452fb444e4668e8eeb23a7f29b97d3824e9ed688e8c8135f
3c5e247cb1e9728d3243c7eb4f814a1d42d35041a00802d50afe80a0da36b3a7
08eb889660d9302844e073a90f01a999dd220ef609d276d415c6c67032db69be
SH256 hash:
6817f5bc2c65ce63767514f18c3f1a78dae713876cdae0f79b5cc1e55de71799
MD5 hash:
f7a07edb960489f4c5f23379b1f238e6
SHA1 hash:
3c7b8a6d358b6d2ccf67372dbf2d4b2e72d4b083
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments