MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6c052c5869d963acac5fbd2c0a80ac161347d33c7290e7095f0c5406245366f7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs 1 YARA File information Comments

SHA256 hash: 6c052c5869d963acac5fbd2c0a80ac161347d33c7290e7095f0c5406245366f7
SHA3-384 hash: 9f0be68a513e8d1187391a814c7099f5cc071fd5beada3b8600bb2219c8ec5a634c9a8f76f0b74cf3c08144ac8f128e1
SHA1 hash: 1de5d4d91ff3779fc0fc77ae993d2b1f7aa7064c
MD5 hash: 448a63b4429ea5497b3ff3f21d3922d6
humanhash: illinois-gee-quiet-uniform
File name:448a63b4429ea5497b3ff3f21d3922d6.exe
Download: download sample
Signature RedLineStealer
File size:387'072 bytes
First seen:2022-04-12 06:26:02 UTC
Last seen:2022-04-12 06:59:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c05c69e25e4cfe454ad2fbd0d1a9d1b0 (6 x RedLineStealer)
ssdeep 6144:C9EUA4g6zO8zlZb6w3aY6EFEijVrbXienrcx0rJeXdVpA/eqL5hfeLkm:YEUAIi8zlZbYUEipTiercx0ragP5xev
Threatray 3'731 similar samples on MalwareBazaar
TLSH T19D84C010BA90D035F5F766F859B992ACB92E7EE15B2450CF22D426EE17346E0ED3070B
File icon (PE):PE icon
dhash icon 8c9e8c6eaa8ecc8e (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.106.191.132:41177

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.106.191.132:41177 https://threatfox.abuse.ch/ioc/518759/

Intelligence


File Origin
# of uploads :
2
# of downloads :
268
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
448a63b4429ea5497b3ff3f21d3922d6.exe
Verdict:
Malicious activity
Analysis date:
2022-04-13 05:55:43 UTC
Tags:
redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Launching the default Windows debugger (dwwin.exe)
Stealing user critical data
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Ransomware.StopCrypt
Status:
Malicious
First seen:
2022-04-12 06:27:06 UTC
File Type:
PE (Exe)
Extracted files:
8
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:50 discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
193.106.191.132:41177
Unpacked files
SH256 hash:
5ff6c585ba1ca791690c47b9d2164f8f4a0b1e1be4dd5ea7949b4088ad1ed31a
MD5 hash:
94df550b09ea3888d3c97cd7ca6b68c7
SHA1 hash:
82b44b60aca618dc953112ecdd205904d1df7fb9
SH256 hash:
fd77c273cdc765545dd80d12ab08fb2930372bfd91605f38cd555a6eafc9de7c
MD5 hash:
4325d471b0bfbd9ee905470b62ff0437
SHA1 hash:
6a0ca7c1e137c29eab3b992dc8c3f5f59fdd9ae3
SH256 hash:
c73178410f201f31f3bb808381158ebb7b1caf9fbe1bffb2b92b66de7e2bc36b
MD5 hash:
ea541f60b23e9b9a2a54cfd3e96848f3
SHA1 hash:
48c57a65dff2a94280595065076bbc105ea5abd7
SH256 hash:
6c052c5869d963acac5fbd2c0a80ac161347d33c7290e7095f0c5406245366f7
MD5 hash:
448a63b4429ea5497b3ff3f21d3922d6
SHA1 hash:
1de5d4d91ff3779fc0fc77ae993d2b1f7aa7064c
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 6c052c5869d963acac5fbd2c0a80ac161347d33c7290e7095f0c5406245366f7

(this sample)

  
Delivery method
Distributed via web download

Comments