MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7b78f37ade729464194676ac2d6d35d400dedf985121a1e1c61383835da2159d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 5 File information Comments 1

SHA256 hash: 7b78f37ade729464194676ac2d6d35d400dedf985121a1e1c61383835da2159d
SHA3-384 hash: 28557c8d67a6e27bb952dece74e7a2f970d68011b4569a1f32b075ed8632d76bf2227b3fc40d8d1600983945fbf0087c
SHA1 hash: e4ff40ce30606f9f7996d7a3afe2a32faedf6379
MD5 hash: bd909027c1cb08bc109bddf89a8cfe1a
humanhash: summer-ceiling-oven-ohio
File name:bd909027c1cb08bc109bddf89a8cfe1a
Download: download sample
Signature RedLineStealer
File size:1'629'912 bytes
First seen:2021-12-05 19:50:53 UTC
Last seen:2021-12-05 22:30:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'205 x SnakeKeylogger)
ssdeep 24576:dJDbOOcTef0u0Lne8egiVrq3W5/+rTQz9oLIbh:dJDbkM0uwFegHQ6m9oa
Threatray 994 similar samples on MalwareBazaar
TLSH T14E75AF29E6E29E55C256DA37942ACC7086D1D7803263E356F6F702A32E4F3B04D963C7
Reporter zbetcheckin
Tags:32 exe RedLineStealer signed

Code Signing Certificate

Organisation:Unpunctual
Issuer:Unpunctual
Algorithm:sha1WithRSAEncryption
Valid from:2021-11-26T21:00:00Z
Valid to:2031-12-03T21:00:00Z
Serial number: 51d650ae86c1ae9547cff6ebe502f389
Thumbprint Algorithm:SHA256
Thumbprint: 7575cb07ea5f8e90043c2db5deacd7895b9477afbf0a8e28b1ac3f9f86661cdc
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
248
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
bd909027c1cb08bc109bddf89a8cfe1a
Verdict:
Malicious activity
Analysis date:
2021-12-05 19:54:38 UTC
Tags:
evasion trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a file
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Searching for the window
Sending a custom TCP request
Launching the default Windows debugger (dwwin.exe)
Using the Windows Management Instrumentation requests
Creating a window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
obfuscated overlay packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Amadey RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Conti Backup Database
Sigma detected: Disable or Delete Windows Eventlog
Sigma detected: PowerShell SAM Copy
Sigma detected: Suspicious PowerShell Invocations - Generic
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 534275 Sample: d5JBgNQCR9 Startdate: 05/12/2021 Architecture: WINDOWS Score: 100 61 Found malware configuration 2->61 63 Multi AV Scanner detection for submitted file 2->63 65 Yara detected Amadeys stealer DLL 2->65 67 9 other signatures 2->67 9 d5JBgNQCR9.exe 3 2->9         started        process3 file4 35 C:\Users\user\AppData\...\d5JBgNQCR9.exe.log, ASCII 9->35 dropped 69 May check the online IP address of the machine 9->69 13 d5JBgNQCR9.exe 15 6 9->13         started        signatures5 process6 dnsIp7 45 iplogger.org 5.9.162.45, 443, 49765 HETZNER-ASDE Germany 13->45 37 C:\Users\user\AppData\Local\Temp\Triads.exe, PE32 13->37 dropped 39 C:\Users\user\AppData\Local\...\Fetlocked.exe, PE32 13->39 dropped 41 C:\Users\user\AppData\Local\Temp\?.exe, PE32 13->41 dropped 17 ?.exe 2 13->17         started        20 Fetlocked.exe 2 13->20         started        22 Triads.exe 2 13->22         started        file8 process9 signatures10 47 Multi AV Scanner detection for dropped file 17->47 49 Detected unpacking (changes PE section rights) 17->49 51 Detected unpacking (overwrites its own PE header) 17->51 53 Contains functionality to inject code into remote processes 17->53 55 Antivirus detection for dropped file 20->55 57 Machine Learning detection for dropped file 20->57 59 Injects a PE file into a foreign processes 20->59 24 Fetlocked.exe 2 20->24         started        27 conhost.exe 20->27         started        29 Triads.exe 22->29         started        31 conhost.exe 22->31         started        process11 dnsIp12 43 185.92.74.32, 10442 FOXCLOUDNL Netherlands 24->43 33 WerFault.exe 23 11 29->33         started        process13
Threat name:
ByteCode-MSIL.Trojan.Lazy
Status:
Malicious
First seen:
2021-12-05 16:25:11 UTC
File Type:
PE (.Net Exe)
AV detection:
16 of 45 (35.56%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:re discovery infostealer spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Amadey
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.35/d2VxjasuwS/index.php
87.251.73.109:37261
Unpacked files
SH256 hash:
87c233cf81a1be07342c1f67dc40b71c95d39249674eac0fdfdf631754a9de42
MD5 hash:
39236aec7824a8f4fab52ac2ba318770
SHA1 hash:
70cb4c5092d786f9ba121a1d66dd6c3d4e732e9b
SH256 hash:
88d6dbfe1616deac6504817b2b9e7a8e9dfc3d823fd308c66c6a8d5c04a7d8ca
MD5 hash:
be976de1296009a9a1bb6f863bc1c248
SHA1 hash:
41a24c7f21b9f7bc61f6c3af8d19f1c4b9e8615b
SH256 hash:
b415cf61ccf2a803e79449558f683967fbab8c5c42d6a76f2360f330fc983f38
MD5 hash:
fab6e108eba5deea12ba31136a170250
SHA1 hash:
74baa1300a92f07980416346a42c1983068cb5b0
SH256 hash:
5cdea24d1615c61ddd587573236143030c054e000435f6f7aff41f5b5be50893
MD5 hash:
284c385a126b61fbdce136e50ab4eff8
SHA1 hash:
bb6103a82fd312bf8359ef9152bd9c719c55e571
SH256 hash:
348fb27248310d8a6984bdb66796cf2cbc8871adc4ade19a9b3d8324cd2a2f02
MD5 hash:
402577e230849f875d8e0aa2a82c70d9
SHA1 hash:
47ae78b445c1da9b8192eac263a19eacce64b39e
SH256 hash:
acd7f67e0dcc0ccb219ce5406f180a217cc5b8adc3385fd87c95fe6f68fb29ed
MD5 hash:
eccf9e4f803d012acf6cd09e2ee1e5be
SHA1 hash:
176393b5e162c93426dcb1ff2961c365491d3299
SH256 hash:
6dfad1626cf7ad3ee56cc637efb322cc9887b0df81d22bbe276b043d2b1c11eb
MD5 hash:
f6f8abf8885b507b5df8e5dcd18b2abf
SHA1 hash:
fd05db06d150d78aee32f5339ee0ec4140d76e7b
SH256 hash:
7b78f37ade729464194676ac2d6d35d400dedf985121a1e1c61383835da2159d
MD5 hash:
bd909027c1cb08bc109bddf89a8cfe1a
SHA1 hash:
e4ff40ce30606f9f7996d7a3afe2a32faedf6379
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 7b78f37ade729464194676ac2d6d35d400dedf985121a1e1c61383835da2159d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-05 19:50:54 UTC

url : hxxp://host-file-coin-4.com/files/1660_1638632962_4871.exe