MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 702d02cc220387cd8f2029520cde97bd3879a1e151b198b4e3faea08b808cc9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 11
| SHA256 hash: | 702d02cc220387cd8f2029520cde97bd3879a1e151b198b4e3faea08b808cc9a |
|---|---|
| SHA3-384 hash: | e2d35c181237c3592862980e3249d2433726a073a064812b9776b2fb6ff9bdcdde7b14fe95cf9872ceeba9b3e925d384 |
| SHA1 hash: | 8c21fcfa81324673baea73cdcb505601aa996371 |
| MD5 hash: | 6d8efbdd3c7a04521f1626f515562ef4 |
| humanhash: | wisconsin-connecticut-sodium-butter |
| File name: | 702d02cc220387cd8f2029520cde97bd3879a1e151b19.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 4'377'600 bytes |
| First seen: | 2021-10-28 20:41:59 UTC |
| Last seen: | 2021-10-28 21:59:56 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 908bea7ee71339f1c35ba419da3ba679 (36 x RedLineStealer, 2 x RaccoonStealer) |
| ssdeep | 98304:F7toNWVGVOx7kaOvz4aLG6R9S9Awhbft:1VGZvz4aypyqbft |
| Threatray | 1'618 similar samples on MalwareBazaar |
| TLSH | T17A162232A7A10055E4E5CC368837FEE470B91B1B8F40A4B677F6AACB18714D0E663D97 |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 144.76.156.28:3333 | https://threatfox.abuse.ch/ioc/239353/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
176
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6609814701637632.zip
Verdict:
Malicious activity
Analysis date:
2021-10-27 12:41:31 UTC
Tags:
autoit trojan evasion rat redline stealer vidar opendir loader formbook smoke raccoon
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Pwsx
Status:
Malicious
First seen:
2021-10-27 12:35:52 UTC
AV detection:
11 of 28 (39.29%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Similar samples:
+ 1'608 additional samples on MalwareBazaar
Result
Malware family:
redline
Score:
10/10
Tags:
family:redline botnet:@black_capo infostealer spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
144.76.156.28:3333
Unpacked files
SH256 hash:
ccb77e52655320f4475dd965c444d6f109425046638c2fed5141dedf16421262
MD5 hash:
6a015f530d401f2e7fa0b9538e0a167a
SHA1 hash:
3efa621cb18c44a4f615210c50ab7e13d4f1b603
SH256 hash:
702d02cc220387cd8f2029520cde97bd3879a1e151b198b4e3faea08b808cc9a
MD5 hash:
6d8efbdd3c7a04521f1626f515562ef4
SHA1 hash:
8c21fcfa81324673baea73cdcb505601aa996371
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Redline
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
No further information available
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.