MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 71a117de440384fdc4b8fb690fc73674e9e2a9a75e68951ae798374808924264. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 12
| SHA256 hash: | 71a117de440384fdc4b8fb690fc73674e9e2a9a75e68951ae798374808924264 |
|---|---|
| SHA3-384 hash: | 499f715483862e060bd4b2439c8fe904b8ff54347ba2331c5629e303b0ca94d05509bc5eea7049870cfcf22ea9ddcd6e |
| SHA1 hash: | 55ba99cf12f267086867a698181ed02110d47d0f |
| MD5 hash: | b51bea293772440512d9e3492c0034f0 |
| humanhash: | coffee-indigo-romeo-romeo |
| File name: | 71A117DE440384FDC4B8FB690FC73674E9E2A9A75E689.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 4'671'752 bytes |
| First seen: | 2021-11-07 10:20:45 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 32569d67dc210c5cb9a759b08da2bdb3 (122 x RedLineStealer, 42 x DiamondFox, 37 x RaccoonStealer) |
| ssdeep | 98304:x3rRBtGVUQNqeyN1wjDeWME5hoIc6XdHyaYfZkVHAylyllQbds:x3rRJ3eyNSjyjE5holIdHxYfZkBUQu |
| TLSH | T197263325B6FDC87AC0921070DD9C2B60E0F7D324515BC8EB1B4466DEAF2C687D61B93A |
| File icon (PE): | |
| dhash icon | 848c5454baf47474 (2'088 x Adware.Neoreklami, 101 x RedLineStealer, 33 x DiamondFox) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 135.125.40.67:49126 | https://threatfox.abuse.ch/ioc/244769/ |
| 94.26.230.203:48759 | https://threatfox.abuse.ch/ioc/244776/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Detection:
DLInjector04
Detection(s):
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
Backstage Stealer SmokeLoader Vidar Xmri
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Disable Windows Defender real time protection (registry)
DNS related to crypt mining pools
Downloads files with wrong headers with respect to MIME Content-Type
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to resolve many domain names, but no domain seems valid
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Backstage Stealer
Yara detected Costura Assembly Loader
Yara detected SmokeLoader
Yara detected Vidar stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2021-08-31 04:36:04 UTC
AV detection:
20 of 28 (71.43%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
redline
Score:
10/10
Tags:
family:redline aspackv2 evasion infostealer
Behaviour
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Looks up external IP address via web service
Loads dropped DLL
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
RedLine
RedLine Payload
Unpacked files
SH256 hash:
5f463952815ce4f763e9f4b3b72ed70ad82f74a69a271fc2b1588055c3fec4cc
MD5 hash:
21775ff041e7277d87aa8fdf1e09da6c
SHA1 hash:
6dd1d6716cb93adef6c9b39490a79e77fd5396c9
SH256 hash:
65d0caa7b6ba974a3ccd023adb1eccfe37c9783248382aa128636a4b8da52d37
MD5 hash:
593b3c6b4a50f5d8ea328a0abc840d09
SHA1 hash:
2637fd2a316017f056b4a4c8fa762306de87b754
SH256 hash:
835c9b5e60ebf50a888e851d1c7218d436490613ec04a04055b73fbddf73edf3
MD5 hash:
6961557695f34a53cf8224be7c265fbe
SHA1 hash:
f52d34d0b1dbd181f2acb21f42d875d514afb6f7
SH256 hash:
fb9d379ff908f5366cda1aec6da17f9909787015ac8fe62093b8dac10d5588b0
MD5 hash:
ebd32b83a8bbf1494bf3225d4a634c89
SHA1 hash:
ded629806e0cb7e3eb90efea05e078a592dd9e13
SH256 hash:
b208246a4f5d03e7e4fee5ec5b649a308d16ab5cd7836d546e1fd9cb7548bef6
MD5 hash:
b4217eebdc4a57a9b1076360e749418b
SHA1 hash:
d6d9f14e8eeebfb3700e4a310ec69a0fb69fcd61
SH256 hash:
8d2770616313b1e9c83ac35afdc0be523940ad59730179911b7ef2c03cf33e13
MD5 hash:
4210a3e50e91884a81658983b1f86be2
SHA1 hash:
ba75c3656561e3575340defdf07b7a9664eb1957
SH256 hash:
67305bf55b85bd79d73e8983fa7f2a90fd2409f13412ae336356eb0a22384499
MD5 hash:
a50491727f8be73ca93aa381f1f8979c
SHA1 hash:
ab46ddb38fefcab0e71126847c2a87012972372a
SH256 hash:
4503f68429a28d40b2b7fc9fc12aa64b8357313a001434900d608d32c3efb03c
MD5 hash:
4d9806bbde1050886b60cf08d0a12d11
SHA1 hash:
883ade2ad66d1552ab93aa36bf492f6c5f1476ea
SH256 hash:
fbffb84931a267fab6c24cf08723fa029cb85c2315f01d5b1f41922350adb831
MD5 hash:
052270e8e9cfb3512932e0df484caef4
SHA1 hash:
85305fee690beea8458bab5d55d0368c47340501
SH256 hash:
40f8dce31beb48a500833b7d9cc5e8e2c769383560144eca987d8d518d80319b
MD5 hash:
303d125ad60ffd7f3851cdfa5e55eaeb
SHA1 hash:
18aeb3956434721c664686c0ce3a4be1f7bd74b9
SH256 hash:
e427f8ef21691e3d8c2313d11129ad08ddef69a158eca2f77c170603478ff0c4
MD5 hash:
0dedd909aae9aa0a89b4422106310e9e
SHA1 hash:
271d36afa5b729ee590cf8066166ca5e9c9d0340
SH256 hash:
918d6c0eefdf65105a529d1a8268871f94aa9c5342276faedcde2932e16fe1d3
MD5 hash:
8fa35c1eedb3b1aec95cb0ae4ea9f288
SHA1 hash:
cee9648cc9bd46f2c49adb511cc99f46533de3e5
SH256 hash:
3fccf0062245a335964b95c370581f71e24eb2c1edd231bc30ac8ddf63bbf367
MD5 hash:
721b9800ee1c7d81afbca0290b95dae9
SHA1 hash:
03dac58fa2d1aa895b37ed1d3b22fe756be73b58
SH256 hash:
1e47b0a87b714febf0f805a2c319a150cc8bd58d738669c76c975a64d40130ab
MD5 hash:
6cbca955ae2bb778cf9de6cef5d114a7
SHA1 hash:
527feb36a0cbd2c348df1862bb2d4516ed9bad6f
SH256 hash:
856406c9c7b31f0c00351ad33116eef6266e808f62707dbdd452d78d87c15b49
MD5 hash:
dcb44b893efae5ddd8cb122af5c988f2
SHA1 hash:
b7a5c73b39271c594545f0d35e5c1f739f37fa7f
Detections:
win_oski_g0
Parent samples :
71a117de440384fdc4b8fb690fc73674e9e2a9a75e68951ae798374808924264
33cbd9e39dd39a84d0426897605b17000046e0fb14399e9d0bf47b55c0e3ad8b
b10274561191cedb0b16d2a69fdcd4e5062edfe2621842eacd55945ffded3f57
6dfd902231e6aa1301c11eca21f5a29456aa020bfe1eb19d05541ab32316a326
2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357
15f4e965344a38b07713363133e6624f72db10cb297967e91608eec1020e6b1d
33cbd9e39dd39a84d0426897605b17000046e0fb14399e9d0bf47b55c0e3ad8b
b10274561191cedb0b16d2a69fdcd4e5062edfe2621842eacd55945ffded3f57
6dfd902231e6aa1301c11eca21f5a29456aa020bfe1eb19d05541ab32316a326
2a9e7bc07bd4ec39c2beaa42ff35352bbe6400f899f70be8922688db70cc5357
15f4e965344a38b07713363133e6624f72db10cb297967e91608eec1020e6b1d
SH256 hash:
dc2724f6e5447bb4746c4d6587844788293a372018c3c399d16fad22af31a3a4
MD5 hash:
c773417676b5c1f853daa32fb466b656
SHA1 hash:
0d5de4a2cc2ebfa43fbc90d920284174a90ea466
SH256 hash:
8019f2462cd90b2fc6598c58d8dd2221ad4b9b27406cfe27f782662f973d7e36
MD5 hash:
ac3020e76cc5c454c961932085bf1fc0
SHA1 hash:
90aa616b807687b64d5999cde8a0a02c626b5855
SH256 hash:
761cac88d23dc49adfbd2be17b51e85b99568b62074c9c65805bc3ba22fcaba1
MD5 hash:
6938b2705f565753adf391ac3810a06f
SHA1 hash:
103afdff21e09aa3b05b5727553b92c5404fe2c2
SH256 hash:
834f3b4a65042fcd15a3f9155f8e083e8f2a42e5bdfb4db8a3206f7f023f2239
MD5 hash:
e40f0cea85886d128ee32e840ec639f8
SHA1 hash:
09ae92d173b055d743827dbeb840a9dbc608d854
SH256 hash:
9a10a10618d20b7421fc561204710634dfcf7a5e7be48d54770b86e1a9750d50
MD5 hash:
e35ab85bf8cb24ae9c414521b5a8dbce
SHA1 hash:
ca6482b215cab186a0ee29a057b8af15a40e18e7
SH256 hash:
71a117de440384fdc4b8fb690fc73674e9e2a9a75e68951ae798374808924264
MD5 hash:
b51bea293772440512d9e3492c0034f0
SHA1 hash:
55ba99cf12f267086867a698181ed02110d47d0f
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
iSpy Keylogger
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.