MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7d5a9009545155455d1a54cfb1b2ac8439048efb7608f8a17608820452eee60b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 7 File information Comments

SHA256 hash: 7d5a9009545155455d1a54cfb1b2ac8439048efb7608f8a17608820452eee60b
SHA3-384 hash: c9ce66dd707d5046d0b53f00f5b3c13309bd8af9f8ec32c76e757f1b681b293329f8990a567b0703a13e81d39888f31f
SHA1 hash: 9cfb7e88e093f3288574faba2b24f475eff157ac
MD5 hash: e2b025b09e74f407f821f00b691a07bd
humanhash: papa-winter-kansas-oven
File name:e2b025b09e74f407f821f00b691a07bd.exe
Download: download sample
Signature RedLineStealer
File size:364'032 bytes
First seen:2021-12-11 08:36:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 40946eb7f18ff06bd788849825e1d2cd (2 x RedLineStealer, 1 x CryptBot, 1 x RaccoonStealer)
ssdeep 6144:WAHLkq7/xjfb9yv280Y5hx4Z1buzbgwu6L7ITsqSigaTwVfr:NHFdjfs+x8xaxunnn7s
Threatray 1'153 similar samples on MalwareBazaar
TLSH T11374D0F126ED8572D0533E304825A7A19B2BBD52EA20D206FA34674E1F73BDC45E235E
File icon (PE):PE icon
dhash icon 1ee2d83c6cb8f24e (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://ad-postback.biz/stats/save.php

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://ad-postback.biz/stats/save.php https://threatfox.abuse.ch/ioc/274488/

Intelligence


File Origin
# of uploads :
1
# of downloads :
161
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e2b025b09e74f407f821f00b691a07bd.exe
Verdict:
Malicious activity
Analysis date:
2021-12-11 08:38:55 UTC
Tags:
trojan evasion rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending an HTTP GET request
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CPUID_Instruction
MeasuringTime
EvasionGetTickCount
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm exploit greyware lockbit packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Raccoon
Status:
Malicious
First seen:
2021-12-08 20:11:56 UTC
File Type:
PE (Exe)
Extracted files:
82
AV detection:
25 of 27 (92.59%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
suricata
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Deletes itself
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE GCleaner Downloader Activity M5
Unpacked files
SH256 hash:
1f3329e2454dda3b180889ee5ca94a89ba5d73c140ae92452f052f412c7047db
MD5 hash:
ac9c80f3662c0d9c9777815ea7f5365a
SHA1 hash:
10993f81aac724bdd4f9f27693a0722fb2e83d3b
SH256 hash:
7d5a9009545155455d1a54cfb1b2ac8439048efb7608f8a17608820452eee60b
MD5 hash:
e2b025b09e74f407f821f00b691a07bd
SHA1 hash:
9cfb7e88e093f3288574faba2b24f475eff157ac
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_onlyLogger
Author:ditekSHen
Description:Detects onlyLogger loader variants
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:SUSP_XORed_Mozilla
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:SUSP_XORed_Mozilla_RID2DB4
Author:Florian Roth
Description:Detects suspicious XORed keyword - Mozilla/5.0
Reference:Internal Research
Rule name:XOREngine_Misc_XOR_Func
Author:smiller cc @florian @wesley idea on implementation with yara's built in XOR function
Description:Use with care, https://twitter.com/cyb3rops/status/1237042104406355968

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments