MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a58fcee265cf80cd826e7de3dbf2c2f4cabf6a49be83edf4acefbdfda59fcec. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 7a58fcee265cf80cd826e7de3dbf2c2f4cabf6a49be83edf4acefbdfda59fcec
SHA3-384 hash: 42310626ebeec969a0466954010b198c27030b78ed9414adc48b38ebd8cb622fb144c22ea5afdab18807aeff942e5492
SHA1 hash: 150dc528f63c3b7c4d9c032227ed7e477da3f5a6
MD5 hash: 2797c0df1c61a09de7b58195eb669bb6
humanhash: sad-fish-coffee-diet
File name:2797c0df1c61a09de7b58195eb669bb6.exe
Download: download sample
Signature RedLineStealer
File size:456'192 bytes
First seen:2021-11-21 16:00:17 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f4dd2fc3c2bc0f7f37512a211d153f86 (2 x Smoke Loader, 1 x DanaBot, 1 x CryptBot)
ssdeep 6144:E8CPprphRz4a1N0O7U9nhsUvCaldRAikiEgxNd:E8CRrdl7mhsUvC6HACEgx/
Threatray 14 similar samples on MalwareBazaar
TLSH T1D7A4BE04E7E1C030F1B612F889759368B53F7EA1BB2490CB52D52AEE5634AE1ED7131B
File icon (PE):PE icon
dhash icon 1412b2e068696c46 (3 x Smoke Loader, 2 x RedLineStealer, 1 x RaccoonStealer)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2797c0df1c61a09de7b58195eb669bb6.exe
Verdict:
Malicious activity
Analysis date:
2021-11-21 16:03:20 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Сreating synchronization primitives
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Launching the default Windows debugger (dwwin.exe)
Sending a TCP request to an infection source
Stealing user critical data
Query of malicious DNS domain
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Raccrypt
Status:
Malicious
First seen:
2021-11-21 16:01:06 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:updbdate discovery infostealer spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
193.56.146.64:65441
Unpacked files
SH256 hash:
bf89bbeb9c8c26b97cabafc37f82a7a8c17beaa9c4c2022a0fa97e192c2e5341
MD5 hash:
4f7919e72580d05f83c2efdf5be272bf
SHA1 hash:
a32da4d24a60c85651f492ddec81c50a947bc7f7
SH256 hash:
d5acec00fe9f8896cd6965ac70d8576a76b418f28d1edc6d12b802a6c4b65efa
MD5 hash:
2691eb4069f4e0da4cfa1c39758009ec
SHA1 hash:
9a4684a2b771e1fcbe0572d15a21bf320a450ebf
SH256 hash:
05c03b24ee6a0fdc40fbe8a6db1f9501404c87376ca8876fd304be4c16ac0b74
MD5 hash:
e70dcfa399c1dfdb8f243d00eea36284
SHA1 hash:
09437d7f193419585d3af8a33ec09eb1c3e9c818
SH256 hash:
7a58fcee265cf80cd826e7de3dbf2c2f4cabf6a49be83edf4acefbdfda59fcec
MD5 hash:
2797c0df1c61a09de7b58195eb669bb6
SHA1 hash:
150dc528f63c3b7c4d9c032227ed7e477da3f5a6
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 7a58fcee265cf80cd826e7de3dbf2c2f4cabf6a49be83edf4acefbdfda59fcec

(this sample)

  
Delivery method
Distributed via web download

Comments