MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 773b40c8007545afd1b563bdf17dab8225acd4bd6def35e4db95f70fca16371c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 773b40c8007545afd1b563bdf17dab8225acd4bd6def35e4db95f70fca16371c
SHA3-384 hash: 6ea25594c65af4518e81422637acef26dde8e0d8d65199e9bab8c510660837c1482c124505d39f33af992d90d2cbf9a0
SHA1 hash: 85d72dd1cdf60d9dd4c2696d950e63d163102c37
MD5 hash: c9b0c2b2a7988eb97f7069bb423a7ffa
humanhash: hawaii-carbon-princess-failed
File name:Bitcoin Mining Software 1.5v.exe
Download: download sample
Signature RedLineStealer
File size:4'776'960 bytes
First seen:2021-10-23 15:47:54 UTC
Last seen:2021-10-23 17:17:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 908bea7ee71339f1c35ba419da3ba679 (36 x RedLineStealer, 2 x RaccoonStealer)
ssdeep 98304:5LXT3b5B8T4O1OiZ/iZHZsonSh1XbiRFqE0c+Jmp:x52Tz1XZ/iZ5sFriRFt0c+E
Threatray 74 similar samples on MalwareBazaar
TLSH T18226123332E44156D0F18D398937FEA1B1F7063B4B82E8FA63995EC539325D1A2225B7
Reporter JaffaCakes118
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
567
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Bitcoin Mining Software 1.5v.exe
Verdict:
Malicious activity
Analysis date:
2021-10-23 15:47:38 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Creates a thread in another existing process (thread injection)
Detected VMProtect packer
Drops PE files to the user root directory
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 508112 Sample: Bitcoin Mining Software 1.5v.exe Startdate: 23/10/2021 Architecture: WINDOWS Score: 100 106 Antivirus / Scanner detection for submitted sample 2->106 108 Multi AV Scanner detection for submitted file 2->108 110 Detected VMProtect packer 2->110 112 5 other signatures 2->112 13 Bitcoin Mining Software 1.5v.exe 2->13         started        16 services32.exe 2->16         started        process3 signatures4 162 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->162 164 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 13->164 166 Writes to foreign memory regions 13->166 168 Injects a PE file into a foreign processes 13->168 18 AppLaunch.exe 15 7 13->18         started        23 WerFault.exe 23 9 13->23         started        170 Multi AV Scanner detection for dropped file 16->170 172 Machine Learning detection for dropped file 16->172 174 Allocates memory in foreign processes 16->174 176 2 other signatures 16->176 25 conhost.exe 16->25         started        process5 dnsIp6 94 185.209.22.181, 29234, 49775 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 18->94 96 cdn.discordapp.com 162.159.130.233, 443, 49780 CLOUDFLARENETUS United States 18->96 98 192.168.2.1 unknown unknown 18->98 90 C:\Users\user\AppData\Local\Temp\build.exe, PE32+ 18->90 dropped 122 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->122 124 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->124 126 Tries to harvest and steal browser information (history, passwords, etc) 18->126 128 Tries to steal Crypto Currency Wallets 18->128 27 build.exe 18->27         started        130 Adds a directory exclusion to Windows Defender 25->130 30 cmd.exe 25->30         started        32 cmd.exe 25->32         started        file7 signatures8 process9 signatures10 142 Multi AV Scanner detection for dropped file 27->142 144 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 27->144 146 Machine Learning detection for dropped file 27->146 150 4 other signatures 27->150 34 conhost.exe 4 27->34         started        148 Adds a directory exclusion to Windows Defender 30->148 38 conhost.exe 30->38         started        40 powershell.exe 30->40         started        42 powershell.exe 30->42         started        44 conhost.exe 32->44         started        46 taskkill.exe 32->46         started        process11 file12 88 C:\Users\user\services32.exe, PE32+ 34->88 dropped 118 Drops PE files to the user root directory 34->118 120 Adds a directory exclusion to Windows Defender 34->120 48 cmd.exe 34->48         started        50 cmd.exe 1 34->50         started        53 cmd.exe 1 34->53         started        signatures13 process14 signatures15 55 services32.exe 48->55         started        58 conhost.exe 48->58         started        114 Uses schtasks.exe or at.exe to add and modify task schedules 50->114 116 Adds a directory exclusion to Windows Defender 50->116 60 powershell.exe 23 50->60         started        62 conhost.exe 50->62         started        64 powershell.exe 50->64         started        66 conhost.exe 53->66         started        68 schtasks.exe 53->68         started        process16 signatures17 132 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 55->132 134 Writes to foreign memory regions 55->134 136 Allocates memory in foreign processes 55->136 138 Creates a thread in another existing process (thread injection) 55->138 70 conhost.exe 55->70         started        process18 dnsIp19 100 github.com 140.82.121.3, 443, 49784 GITHUBUS United States 70->100 102 raw.githubusercontent.com 185.199.110.133, 443, 49785 FASTLYUS Netherlands 70->102 104 sanctam.net 70->104 92 C:\Users\user\AppData\...\sihost32.exe, PE32+ 70->92 dropped 140 Adds a directory exclusion to Windows Defender 70->140 75 sihost32.exe 70->75         started        78 cmd.exe 70->78         started        file20 signatures21 process22 signatures23 152 Multi AV Scanner detection for dropped file 75->152 154 Writes to foreign memory regions 75->154 156 Allocates memory in foreign processes 75->156 158 Creates a thread in another existing process (thread injection) 75->158 80 conhost.exe 75->80         started        160 Adds a directory exclusion to Windows Defender 78->160 82 conhost.exe 78->82         started        84 powershell.exe 78->84         started        86 powershell.exe 78->86         started        process24
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2021-10-22 19:33:46 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@estetikasell infostealer spyware vmprotect
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
185.209.22.181:29234
Unpacked files
SH256 hash:
108d1742af840eecaae85a83602d852621d8f7490bea9cb5aed554f99ecfe95a
MD5 hash:
56bf7f895575d0070c1a6092d87adfc2
SHA1 hash:
971d5db7aa972a0014477d4f3a11b1d956e78832
SH256 hash:
773b40c8007545afd1b563bdf17dab8225acd4bd6def35e4db95f70fca16371c
MD5 hash:
c9b0c2b2a7988eb97f7069bb423a7ffa
SHA1 hash:
85d72dd1cdf60d9dd4c2696d950e63d163102c37
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 773b40c8007545afd1b563bdf17dab8225acd4bd6def35e4db95f70fca16371c

(this sample)

  
Delivery method
Distributed via web download

Comments