MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7afefba65e72f42925ba76fae9ea98286eff7d0d01dcccd07c6117384858b6bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 7afefba65e72f42925ba76fae9ea98286eff7d0d01dcccd07c6117384858b6bb
SHA3-384 hash: d5aed4a640fc09dc2e1efb2905057c4019b7c890ca4fcdaf500bdfdcb8cf7c1056f90660bbab5b6fbbfd1721a45cd157
SHA1 hash: 8e2c19b9247bb799a2f0191af144cdf2e85db099
MD5 hash: db78b6b4e4ace66632b1b7d746f1d716
humanhash: cola-nuts-cardinal-dakota
File name:db78b6b4e4ace66632b1b7d746f1d716.exe
Download: download sample
Signature RedLineStealer
File size:390'656 bytes
First seen:2020-12-07 19:01:29 UTC
Last seen:2020-12-07 20:38:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8199980e4fa11bb2eef21fa8f6072def (1 x RedLineStealer)
ssdeep 6144:8qprONykLCWtRm2YXSO6UBN+k2LaAa4TbuS0TLCK:LpaNyk2WHm2u2U8aAa4T6SECK
Threatray 171 similar samples on MalwareBazaar
TLSH 5384DF1176A1C472C03175716553CBBC9A6FB8B5E821DA4B2BC9E6B80F347D29A6230F
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://dovakl.xyz/IRemotePanel

Intelligence


File Origin
# of uploads :
2
# of downloads :
157
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
db78b6b4e4ace66632b1b7d746f1d716.exe
Verdict:
Malicious activity
Analysis date:
2020-12-07 19:04:45 UTC
Tags:
rat redline trojan

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending an HTTP POST request
Sending a custom TCP request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a file
Stealing user critical data
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
May check the online IP address of the machine
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Worm.Agobot
Status:
Malicious
First seen:
2020-12-07 19:02:05 UTC
AV detection:
16 of 29 (55.17%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:agenttesla family:redline discovery infostealer keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Checks installed software on the system
Looks up external IP address via web service
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
RedLine
Unpacked files
SH256 hash:
671f2de885a15f6d4b03e928a7dd45a3db129525607d8e49905d3fb1398ece55
MD5 hash:
04a60dd808149ca53898b2cdf18cec63
SHA1 hash:
1ab993fd9e7621e3073d00dd168b84fd6d47b524
SH256 hash:
812010441af23194d635156f9295b0d6f5525f83657ee7af21990f954fbbd4fa
MD5 hash:
1977e8003b9c489dfdc99313e09ba413
SHA1 hash:
71eee64b34902720f6d290081adad27ccd6b23e5
Detections:
win_redline_stealer_g0
SH256 hash:
97d6d7c5bf75454c4cec7bae1218c2a038e05bfaf7c7f7c208bce825dcfadc17
MD5 hash:
48ed6912264bdb9101cc99991a1b7ca1
SHA1 hash:
8200ea6e70e65ef8af4910cca9a3beed952954d2
Detections:
win_redline_stealer_g0
SH256 hash:
7afefba65e72f42925ba76fae9ea98286eff7d0d01dcccd07c6117384858b6bb
MD5 hash:
db78b6b4e4ace66632b1b7d746f1d716
SHA1 hash:
8e2c19b9247bb799a2f0191af144cdf2e85db099
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 7afefba65e72f42925ba76fae9ea98286eff7d0d01dcccd07c6117384858b6bb

(this sample)

  
Delivery method
Distributed via web download

Comments