MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6df58f4dde905b78e0ce80d0bb41792004f9ac39efec4acbfb4f54c342ac6dcb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 3 File information Comments

SHA256 hash: 6df58f4dde905b78e0ce80d0bb41792004f9ac39efec4acbfb4f54c342ac6dcb
SHA3-384 hash: dc42d75a41ca4778e5ef431747cac769c5cfe56c0a9dd2965d9f825ba0eb62e2a08a92734b46e4c471f414890f0257e1
SHA1 hash: b0dc370a0f9f844e8b7bfc9d30e912373d452120
MD5 hash: 0f445a96fb01943810445b5fe659c22b
humanhash: earth-texas-vegan-johnny
File name:0f445a96fb01943810445b5fe659c22b
Download: download sample
Signature RedLineStealer
File size:1'189'651 bytes
First seen:2023-04-01 07:07:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (390 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 24576:2TbBv5rUyXV4AjKUlFon8wgi7HnDKqu5ETlRePgp2zi6Twbcltny:IBJRxEgon+LE5APCwi6TWcPny
Threatray 4 similar samples on MalwareBazaar
TLSH T12A4512027DC19872D4621C361A39671165BCBE712FB98EDFA3D06A5EDA311C0CB35BA3
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
246
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c539e1b35b57d8924a24e156bfcc7975
Verdict:
Malicious activity
Analysis date:
2023-03-31 21:32:38 UTC
Tags:
gcleaner loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm greyware overlay packed packed redline setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
MinerDownloader, RedLine, Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic MinerDownloader
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 839182 Sample: XQYmh3N41N.exe Startdate: 01/04/2023 Architecture: WINDOWS Score: 100 91 pastebin.com 2->91 107 Snort IDS alert for network traffic 2->107 109 Malicious sample detected (through community Yara rule) 2->109 111 Antivirus detection for dropped file 2->111 113 14 other signatures 2->113 12 XQYmh3N41N.exe 10 2->12         started        15 cmd.exe 2->15         started        17 cmd.exe 2->17         started        19 7 other processes 2->19 signatures3 process4 file5 87 C:\Users\user\AppData\Local\...\34fldkm.exe, PE32 12->87 dropped 89 C:\Users\user\AppData\Local\...\2v2hf2.exe, PE32 12->89 dropped 21 2v2hf2.exe 12->21         started        24 34fldkm.exe 12->24         started        26 winlogson.exe 15->26         started        34 2 other processes 15->34 36 3 other processes 17->36 28 conhost.exe 19->28         started        30 chcp.com 19->30         started        32 conhost.exe 19->32         started        38 12 other processes 19->38 process6 signatures7 117 Multi AV Scanner detection for dropped file 21->117 119 Machine Learning detection for dropped file 21->119 121 Writes to foreign memory regions 21->121 40 RegSvcs.exe 1 21->40         started        43 WerFault.exe 23 9 21->43         started        123 Allocates memory in foreign processes 24->123 125 Injects a PE file into a foreign processes 24->125 46 RegSvcs.exe 24->46         started        48 WerFault.exe 24->48         started        127 Antivirus detection for dropped file 26->127 process8 dnsIp9 129 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 40->129 131 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 40->131 133 Contains functionality to inject code into remote processes 40->133 139 2 other signatures 40->139 50 AppLaunch.exe 15 31 40->50         started        55 conhost.exe 40->55         started        99 192.168.2.1 unknown unknown 43->99 101 91.193.43.63, 49720, 81 ITFPL Belgium 46->101 103 api.ip.sb 46->103 135 Tries to harvest and steal browser information (history, passwords, etc) 46->135 137 Tries to steal Crypto Currency Wallets 46->137 signatures10 process11 dnsIp12 93 github.com 140.82.121.3, 443, 49713, 49714 GITHUBUS United States 50->93 95 raw.githubusercontent.com 185.199.111.133, 443, 49716, 49717 FASTLYUS Netherlands 50->95 97 pastebin.com 172.67.34.170, 443, 49712, 49721 CLOUDFLARENETUS United States 50->97 79 C:\ProgramData\Dllhost\winlogson.exe, PE32+ 50->79 dropped 81 C:\ProgramData\Dllhost\dllhost.exe, PE32 50->81 dropped 83 C:\ProgramData\Dllhost\WinRing0x64.sys, PE32+ 50->83 dropped 85 C:\ProgramData\HostData\logs.uce, ASCII 50->85 dropped 115 Sample is not signed and drops a device driver 50->115 57 cmd.exe 50->57         started        60 cmd.exe 50->60         started        62 cmd.exe 50->62         started        file13 signatures14 process15 signatures16 141 Encrypted powershell cmdline option found 57->141 143 Uses schtasks.exe or at.exe to add and modify task schedules 57->143 64 powershell.exe 57->64         started        67 conhost.exe 57->67         started        69 conhost.exe 60->69         started        71 schtasks.exe 60->71         started        73 conhost.exe 62->73         started        75 schtasks.exe 62->75         started        process17 signatures18 105 Query firmware table information (likely to detect VMs) 64->105 77 wermgr.exe 64->77         started        process19
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2023-04-01 01:22:35 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:fff infostealer spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
RedLine
Malware Config
C2 Extraction:
91.193.43.63:81
Unpacked files
SH256 hash:
955c6f970cc69f2c52436d163a5f78045d9ad351e33ea37bb7fc66246b3edaa8
MD5 hash:
058707214e525ba1b4a8e200b935e283
SHA1 hash:
9484bbb6933e2e46e237f72252a094a2d095cf80
Detections:
redline
SH256 hash:
509946adeb3a09383c8f8d4a933c7e64007bae005b77393717123ca80730ea74
MD5 hash:
f4e87827cc38fcdf408954e58608c227
SHA1 hash:
10bc00398b9bef5f5f2f770607d81afd924f9950
SH256 hash:
6df58f4dde905b78e0ce80d0bb41792004f9ac39efec4acbfb4f54c342ac6dcb
MD5 hash:
0f445a96fb01943810445b5fe659c22b
SHA1 hash:
b0dc370a0f9f844e8b7bfc9d30e912373d452120
Malware family:
RedLine.E
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AppLaunch
Author:iam-py-test
Description:Detect files referencing .Net AppLaunch.exe
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments