MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 740c9c55568b061b297c1bda104d682e91d340476e8901704c184ee641587883. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 3 File information Comments

SHA256 hash: 740c9c55568b061b297c1bda104d682e91d340476e8901704c184ee641587883
SHA3-384 hash: 3aa210f8672e9d5ef70d64253f1c2962e5eed0d97037848b538bfc9015ed69d1cd474fe543469dd3a6b5b276463b6991
SHA1 hash: e42c8739c8247215da8b49bd5c281357a39da271
MD5 hash: 80719e6b0ffcfd5d78de7e4de7218a8b
humanhash: kilo-mobile-stairway-california
File name:FORTNITE HACK.exe
Download: download sample
Signature RedLineStealer
File size:4'532'224 bytes
First seen:2022-02-14 07:30:28 UTC
Last seen:2022-02-14 10:01:35 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 7dc28ef949f54ad98c715895ecc34cff (79 x RedLineStealer, 2 x Formbook)
ssdeep 98304:pLfn+/bVQG5aLKAxGD0jPJTPPl7Et3FEN9ej3oAz+sItrSBq:pL/SVV5+KAPjPJR43L4w+sSSBq
Threatray 102 similar samples on MalwareBazaar
TLSH T1C02633FBA20CD499DCEF88B4F16DA1184858F501EBD3471B592886F0EA7F1CB1A691F1
Reporter Anonymous
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
191
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending a custom TCP request
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Сreating synchronization primitives
DNS request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Creating a process with a hidden window
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Gathering data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phoenix Miner RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Phoenix Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 571628 Sample: FORTNITE HACK.exe Startdate: 14/02/2022 Architecture: WINDOWS Score: 100 109 Malicious sample detected (through community Yara rule) 2->109 111 Multi AV Scanner detection for submitted file 2->111 113 Yara detected RedLine Stealer 2->113 115 6 other signatures 2->115 10 FORTNITE HACK.exe 1 2->10         started        13 RegHost.exe 1 1 2->13         started        15 RegHost.exe 2->15         started        process3 signatures4 135 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 10->135 137 Writes to foreign memory regions 10->137 139 Allocates memory in foreign processes 10->139 17 AppLaunch.exe 15 7 10->17         started        22 conhost.exe 10->22         started        141 Multi AV Scanner detection for dropped file 13->141 143 Machine Learning detection for dropped file 13->143 145 Injects code into the Windows Explorer (explorer.exe) 13->145 24 bfsvc.exe 13->24         started        26 explorer.exe 13->26         started        28 conhost.exe 13->28         started        147 Modifies the context of a thread in another process (thread injection) 15->147 149 Injects a PE file into a foreign processes 15->149 30 bfsvc.exe 15->30         started        32 conhost.exe 15->32         started        process5 dnsIp6 97 91.243.32.42, 49753, 52075 MATTEOGB Russian Federation 17->97 99 cdn.discordapp.com 162.159.133.233, 443, 49794 CLOUDFLARENETUS United States 17->99 91 C:\Users\user\AppData\Local\...\startix.exe, PE32+ 17->91 dropped 117 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 17->117 119 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 17->119 121 Tries to harvest and steal browser information (history, passwords, etc) 17->121 123 Tries to steal Crypto Currency Wallets 17->123 34 startix.exe 1 2 17->34         started        38 conhost.exe 24->38         started        40 curl.exe 26->40         started        42 curl.exe 26->42         started        44 curl.exe 26->44         started        46 2 other processes 26->46 93 \Device\ConDrv, ASCII 30->93 dropped 125 Hides threads from debuggers 30->125 file7 signatures8 process9 file10 95 C:\Users\user\AppData\Roaming\...\RegHost.exe, PE32+ 34->95 dropped 127 Multi AV Scanner detection for dropped file 34->127 129 Machine Learning detection for dropped file 34->129 131 Injects code into the Windows Explorer (explorer.exe) 34->131 133 4 other signatures 34->133 48 bfsvc.exe 1 34->48         started        51 explorer.exe 1 34->51         started        53 curl.exe 1 34->53         started        56 conhost.exe 34->56         started        58 conhost.exe 40->58         started        60 conhost.exe 42->60         started        62 conhost.exe 44->62         started        signatures11 process12 dnsIp13 107 Hides threads from debuggers 48->107 64 conhost.exe 48->64         started        66 curl.exe 1 51->66         started        69 curl.exe 1 51->69         started        71 curl.exe 1 51->71         started        75 8 other processes 51->75 103 api.telegram.org 149.154.167.220, 443, 49797 TELEGRAMRU United Kingdom 53->103 105 192.168.2.1 unknown unknown 53->105 73 conhost.exe 53->73         started        signatures14 process15 dnsIp16 101 185.137.234.33, 49817, 49820, 49821 SELECTELRU Russian Federation 66->101 77 conhost.exe 66->77         started        79 conhost.exe 69->79         started        81 conhost.exe 71->81         started        83 conhost.exe 75->83         started        85 conhost.exe 75->85         started        87 conhost.exe 75->87         started        89 3 other processes 75->89 process17
Threat name:
Win32.Trojan.Tnega
Status:
Malicious
First seen:
2022-02-14 07:31:14 UTC
File Type:
PE (Exe)
AV detection:
20 of 28 (71.43%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Windows directory
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
77fdc833e984cf741d1036c17f9feab022f89c4d897702588d84542bc34b26b1
MD5 hash:
72fbd63fcd52fe78bcc73d622992e23e
SHA1 hash:
d7c5c6546d683e06b925d5f32014a160793a8eee
SH256 hash:
78c535ddf6e259a6f3b985c5ce79e386a85406841b3063aa7d29ce13fe2c284d
MD5 hash:
212f6ed3d489413c7ed2a831f608bb20
SHA1 hash:
3a8210ecbf47a3e62d288b9fc4831591dbc44001
SH256 hash:
740c9c55568b061b297c1bda104d682e91d340476e8901704c184ee641587883
MD5 hash:
80719e6b0ffcfd5d78de7e4de7218a8b
SHA1 hash:
e42c8739c8247215da8b49bd5c281357a39da271
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments