MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 776b20cd1748219262234b383869bbbab660dac992bc2aacc21ea86865866087. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 5 File information Comments

SHA256 hash: 776b20cd1748219262234b383869bbbab660dac992bc2aacc21ea86865866087
SHA3-384 hash: 1df9246e8434a07085f1b9d0f0d61272201398ff746db0645d5787fbcc4e148d1b1e326594e7474733708437c67a1675
SHA1 hash: e1329d08910d2b121fa6b7a70286ae7be815b0cb
MD5 hash: 175ecc91329c162befdf0fb518a9439a
humanhash: butter-illinois-july-blue
File name:175ecc91329c162befdf0fb518a9439a.exe
Download: download sample
Signature RedLineStealer
File size:797'696 bytes
First seen:2023-06-03 11:30:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 12288:XMrUy90Mn5C/EXIj9Twwy7zEeWUW/14sbgtAAtDm97D4I0xECPp/b0vpMoRDnALp:7yvx4jiPI/zbgt3mDn09teDcLvB
TLSH T177052202ABC88132E9B913B058F606D71A397DB6DA78936B36455D1A0C737C8763633F
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
83.97.73.126:19046

Intelligence


File Origin
# of uploads :
1
# of downloads :
257
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
175ecc91329c162befdf0fb518a9439a.exe
Verdict:
Malicious activity
Analysis date:
2023-06-03 11:32:08 UTC
Tags:
rat redline amadey trojan loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a process
Launching a service
Sending a custom TCP request
Creating a file
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a window
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Disabling the operating system update service
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack.dll CAB greyware installer lolbin packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 881107 Sample: imoCmk3WGP.exe Startdate: 03/06/2023 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic 2->55 57 Multi AV Scanner detection for domain / URL 2->57 59 Found malware configuration 2->59 61 15 other signatures 2->61 9 imoCmk3WGP.exe 1 4 2->9         started        12 rundll32.exe 2->12         started        14 rundll32.exe 2->14         started        16 rundll32.exe 2->16         started        process3 file4 45 C:\Users\user\AppData\Local\...\v2866438.exe, PE32 9->45 dropped 47 C:\Users\user\AppData\Local\...\d3399687.exe, PE32 9->47 dropped 18 v2866438.exe 1 4 9->18         started        process5 file6 37 C:\Users\user\AppData\Local\...\v2723599.exe, PE32 18->37 dropped 39 C:\Users\user\AppData\Local\...\c5219988.exe, PE32 18->39 dropped 63 Antivirus detection for dropped file 18->63 65 Multi AV Scanner detection for dropped file 18->65 67 Machine Learning detection for dropped file 18->67 22 v2723599.exe 1 4 18->22         started        signatures7 process8 file9 41 C:\Users\user\AppData\Local\...\b9603478.exe, PE32 22->41 dropped 43 C:\Users\user\AppData\Local\...\a7889271.exe, PE32 22->43 dropped 69 Antivirus detection for dropped file 22->69 71 Multi AV Scanner detection for dropped file 22->71 73 Machine Learning detection for dropped file 22->73 26 a7889271.exe 1 22->26         started        29 b9603478.exe 4 22->29         started        signatures10 process11 dnsIp12 75 Antivirus detection for dropped file 26->75 77 Machine Learning detection for dropped file 26->77 79 Contains functionality to inject code into remote processes 26->79 87 3 other signatures 26->87 32 AppLaunch.exe 9 1 26->32         started        35 conhost.exe 26->35         started        49 83.97.73.126, 19046, 49692 UNACS-AS-BG8000BurgasBG Germany 29->49 81 Multi AV Scanner detection for dropped file 29->81 83 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 29->83 85 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 29->85 89 2 other signatures 29->89 signatures13 process14 signatures15 51 Disable Windows Defender notifications (registry) 32->51 53 Disable Windows Defender real time protection (registry) 32->53
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2023-06-03 11:31:05 UTC
File Type:
PE (Exe)
Extracted files:
117
AV detection:
28 of 36 (77.78%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:brain botnet:musa discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Modifies Windows Defender Real-time Protection settings
RedLine
Malware Config
C2 Extraction:
83.97.73.126:19046
Unpacked files
SH256 hash:
5fd2699731f9d35005523d73a8a161b3ae245558477ad062dfb6ee672e2789ff
MD5 hash:
7892c8d270e4df80489904a0d8a351a4
SHA1 hash:
78a713e4e4a313b05cbcd4735d259474647eae1e
SH256 hash:
94b2ccbaf06885fb3b859c96ab34a1ea361c9f9443aec4e1059535cb721c17d0
MD5 hash:
9e391f4cb86f74aee722ed5379e8f101
SHA1 hash:
a4d4ecb337ce7d4c0b67157a233b29cd76d194a7
SH256 hash:
1150ed2b9e01f3d597aa2dc0ca38921c289d791502f1a31fa5d4e7efa6bbbca5
MD5 hash:
e43a4fc901bcd26b798b3988af1f5191
SHA1 hash:
7dab908aa79f6c5734492f286f2fa5e921e53f60
Detections:
redline
SH256 hash:
a1ec28e085d3d1ce4512a3df69e1427d1ab3f8d649f6315f5c88348c0b44bb7f
MD5 hash:
808b36b069b8d5e90fe677eaa6cb0d89
SHA1 hash:
5303ea3fe755caf9ab4155a058f927007d744eed
Detections:
Amadey
Parent samples :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 hash:
09084515fa58becda5ee1b2c396ed569b3ae04a14fa11cf404b7317e2ba5b589
MD5 hash:
3ac817fed9a11e4189a3b83547326a7b
SHA1 hash:
47757892fd5bb284a40ee857147bf258ede6de1d
Detections:
HealerAVKiller
Parent samples :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 hash:
776b20cd1748219262234b383869bbbab660dac992bc2aacc21ea86865866087
MD5 hash:
175ecc91329c162befdf0fb518a9439a
SHA1 hash:
e1329d08910d2b121fa6b7a70286ae7be815b0cb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 776b20cd1748219262234b383869bbbab660dac992bc2aacc21ea86865866087

(this sample)

  
Delivery method
Distributed via web download

Comments