MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 69935ac5ba2c7d1785d7b39a3e8bab38cc577a4ee388b042a8aa9ea6595b85f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments 1

SHA256 hash: 69935ac5ba2c7d1785d7b39a3e8bab38cc577a4ee388b042a8aa9ea6595b85f0
SHA3-384 hash: 7cd95659f49f7851b854ef165c11973b6344f5711749365f51359ecb682f9a5a263caebb409350946c76505386574f0c
SHA1 hash: 7e216d2841cb6c50f112383925c8ea1bf96506db
MD5 hash: e1194318498fb1e487fdb17552a16256
humanhash: network-high-early-fourteen
File name:e1194318498fb1e487fdb17552a16256
Download: download sample
Signature RedLineStealer
File size:392'192 bytes
First seen:2022-11-22 05:21:54 UTC
Last seen:2022-11-22 06:30:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 6144:HtjCBL6tgaJoSJwcLkvN5CFcparigZ4G+h/2UJUDMjC/CREFPTUE:s6Oa+XcLK0Fc8OgZ3SrDjC/CRw
TLSH T14184BE2B76908A05D3956E75D0D34F2D6791F48732B2E38F2E1A22892D833F49C5A7C6
TrID 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
9.7% (.EXE) Win64 Executable (generic) (10523/12/4)
6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
4.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
361
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
e1194318498fb1e487fdb17552a16256
Verdict:
Malicious activity
Analysis date:
2022-11-22 05:23:02 UTC
Tags:
loader trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Running batch commands
DNS request
Creating a file in the %temp% directory
Creating a window
Searching for the window
Searching for synchronization primitives
Launching a process
Changing a file
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected VMProtect packer
Drops PE files with benign system names
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Performs DNS queries to domains with low reputation
Tries to detect virtualization through RDTSC time measurements
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 751371 Sample: F2YXIdGMf2.exe Startdate: 22/11/2022 Architecture: WINDOWS Score: 100 73 api.ip.sb 2->73 93 Multi AV Scanner detection for domain / URL 2->93 95 Malicious sample detected (through community Yara rule) 2->95 97 Antivirus detection for dropped file 2->97 99 9 other signatures 2->99 10 F2YXIdGMf2.exe 6 2->10         started        13 dllhost.exe 2->13         started        16 explorer.exe 2->16         started        18 dllhost.exe 2->18         started        signatures3 process4 file5 63 C:\Windows\Temp\17.exe, PE32 10->63 dropped 65 C:\Users\user\AppData\...\F2YXIdGMf2.exe.log, CSV 10->65 dropped 20 17.exe 1 10 10->20         started        25 conhost.exe 10->25         started        119 Antivirus detection for dropped file 13->119 121 Machine Learning detection for dropped file 13->121 123 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 16->123 27 WerFault.exe 16->27         started        signatures6 process7 dnsIp8 75 94.26.226.51, 49689, 80 PTC-YEMENNETYE Russian Federation 20->75 77 idacoromania.ro 89.37.143.190 GTSCEGTSCentralEuropeAntelGermanyCZ Romania 20->77 79 2 other IPs or domains 20->79 53 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 20->53 dropped 55 C:\Users\user\AppData\...\explorer.exe, PE32+ 20->55 dropped 57 C:\Users\user\AppData\...behaviorgraphCJ9J5BHBBGDC5E.exe, PE32 20->57 dropped 59 4 other malicious files 20->59 dropped 101 Creates HTML files with .exe extension (expired dropper behavior) 20->101 103 Creates multiple autostart registry keys 20->103 105 Drops PE files with benign system names 20->105 29 93FEHK29FJJ8EBF.exe 20->29         started        33 2DGKFKB4BHKHBM7.exe 6 20->33         started        35 GCJ9J5BHBBGDC5E.exe 6 20->35         started        37 4 other processes 20->37 file9 signatures10 process11 dnsIp12 67 C:\Windows\Temp\swiftfix.exe, PE32 29->67 dropped 125 Multi AV Scanner detection for dropped file 29->125 127 Machine Learning detection for dropped file 29->127 40 swiftfix.exe 29->40         started        69 C:\Windows\Temp\top1.exe, PE32 33->69 dropped 45 top1.exe 33->45         started        71 C:\Windows\Temp71ewTest1811.exe, PE32 35->71 dropped 47 NewTest1811.exe 35->47         started        81 iplogger.org 148.251.234.83 HETZNER-ASDE Germany 37->81 129 Antivirus detection for dropped file 37->129 131 May check the online IP address of the machine 37->131 49 explorer.exe 37->49         started        file13 signatures14 process15 dnsIp16 83 passport.yandex.ru 213.180.204.24 YANDEXRU Russian Federation 40->83 85 yandex.ru 5.255.255.5 YANDEXRU Russian Federation 40->85 91 2 other IPs or domains 40->91 61 C:\Users\user\AppData\Roaming\...\dllhost.exe, PE32 40->61 dropped 107 Creates multiple autostart registry keys 40->107 87 chardhesha.xyz 194.9.70.250 GMHOSTUA Ukraine 45->87 109 Performs DNS queries to domains with low reputation 45->109 89 185.215.113.216 WHOLESALECONNECTIONSNL Portugal 47->89 111 Antivirus detection for dropped file 49->111 113 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 49->113 115 Machine Learning detection for dropped file 49->115 117 Tries to detect virtualization through RDTSC time measurements 49->117 51 WerFault.exe 9 49->51         started        file17 signatures18 process19
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2022-11-22 02:23:46 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  9/10
Tags:
miner persistence vmprotect
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Adds Run key to start application
Checks computer location settings
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Detectes Phoenix Miner Payload
Unpacked files
SH256 hash:
b506ffaf1e5b78bbc37a9fff68dbb761db590570a67454b17564f8e5325276d6
MD5 hash:
68c8485a374516165360487ce822a437
SHA1 hash:
7e82f7afb593f428cd6ef336933e385572e590cf
SH256 hash:
04e7d2232603776fe83fb8fcd488aebc73f85b3efd9aada207927bcf6381a45f
MD5 hash:
8fa322d79499fee8f56ed0287f06158e
SHA1 hash:
7c1918ed3f098ea81a3c1389703d621e74b66f33
SH256 hash:
69935ac5ba2c7d1785d7b39a3e8bab38cc577a4ee388b042a8aa9ea6595b85f0
MD5 hash:
e1194318498fb1e487fdb17552a16256
SHA1 hash:
7e216d2841cb6c50f112383925c8ea1bf96506db
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 69935ac5ba2c7d1785d7b39a3e8bab38cc577a4ee388b042a8aa9ea6595b85f0

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-11-22 05:21:58 UTC

url : hxxps://filla.com.mk/12/AnlzrTlnr556978.exe