MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7e0150a3d7bbc38f40afa31e78a1e280954ccea8211f98f32e2c65ec96bde43c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 7e0150a3d7bbc38f40afa31e78a1e280954ccea8211f98f32e2c65ec96bde43c
SHA3-384 hash: 2ecb380f793f097a04cdfc75df80cebf0878ab3a1780c635289c37544af7b8dd45340bcc2b33ae7f2e7af45c03b8d0b3
SHA1 hash: f16cc16b817e772e20cd44f9d82b06a14ef6ffdb
MD5 hash: deb60a23233d6e4ba4e9048b65c9cd50
humanhash: paris-utah-vegan-leopard
File name:Cleaner.exe
Download: download sample
Signature RedLineStealer
File size:1'597'312 bytes
First seen:2021-12-05 22:45:29 UTC
Last seen:2021-12-06 00:56:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d7dd6fa75115d9909f747434e40fff68 (173 x RedLineStealer, 10 x DCRat, 1 x CoinMiner.XMRig)
ssdeep 24576:SVhkCtxMLSNG/GpgY2WUPfywRGzgIfflznTL22LtQk92kEaHNYK3SAKAtKe:SVuCtdNGlywRGzg2lznTtQkkNaUAKAH
Threatray 8'818 similar samples on MalwareBazaar
TLSH T15E7523CA849ECA09C28BE5B04D70ED46E478C96758D8B291FBDBF5A326491A7C70F44C
Reporter JaffaCakes118
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
210
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Cleaner.exe
Verdict:
Malicious activity
Analysis date:
2021-12-05 22:45:00 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
DNS request
Sending a custom TCP request
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Running batch commands
Launching a process
Sending an HTTP GET request
Creating a file in the %AppData% subdirectories
Creating a process with a hidden window
Stealing user critical data
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Phoenix Miner RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Conti Backup Database
Sigma detected: Disable or Delete Windows Eventlog
Sigma detected: PowerShell SAM Copy
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Phoenix Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 534313 Sample: Cleaner.exe Startdate: 05/12/2021 Architecture: WINDOWS Score: 100 125 raw.githubusercontent.com 2->125 127 github.com 2->127 161 Antivirus detection for dropped file 2->161 163 Multi AV Scanner detection for submitted file 2->163 165 Yara detected Phoenix Miner 2->165 167 9 other signatures 2->167 12 Cleaner.exe 15 7 2->12         started        17 RegHost.exe 2->17         started        19 RegHost.exe 13 2->19         started        signatures3 process4 dnsIp5 147 byaigelevl.xyz 185.82.126.188, 49751, 80 MAKONIXLV Latvia 12->147 149 github.com 140.82.121.4, 443, 49755, 49758 GITHUBUS United States 12->149 153 3 other IPs or domains 12->153 121 C:\Users\user\AppData\Local\Temp\a.exe, PE32+ 12->121 dropped 123 C:\Users\user\AppData\...\Cleaner.exe.log, ASCII 12->123 dropped 203 Detected unpacking (changes PE section rights) 12->203 205 Detected unpacking (overwrites its own PE header) 12->205 207 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->207 219 4 other signatures 12->219 21 a.exe 1 22 12->21         started        209 Query firmware table information (likely to detect VMs) 17->209 211 Injects code into the Windows Explorer (explorer.exe) 17->211 213 Writes to foreign memory regions 17->213 221 3 other signatures 17->221 26 explorer.exe 17->26         started        28 bfsvc.exe 17->28         started        30 cmd.exe 17->30         started        36 2 other processes 17->36 151 140.82.121.3, 443, 49770, 49771 GITHUBUS United States 19->151 215 Machine Learning detection for dropped file 19->215 217 Tries to detect sandboxes / dynamic malware analysis system (registry check) 19->217 32 cmd.exe 19->32         started        34 conhost.exe 19->34         started        file6 signatures7 process8 dnsIp9 133 185.199.108.133, 443, 49760, 49763 FASTLYUS Netherlands 21->133 135 raw.githubusercontent.com 21->135 137 github.com 21->137 113 C:\Users\user\AppData\Roaming\...\RegHost.exe, PE32+ 21->113 dropped 115 C:\Users\user\AppData\Roaming\...\7z.exe, PE32+ 21->115 dropped 117 C:\Users\user\AppData\Roaming\...\7z.dll, PE32+ 21->117 dropped 119 2 other files (none is malicious) 21->119 dropped 177 Query firmware table information (likely to detect VMs) 21->177 179 Machine Learning detection for dropped file 21->179 181 Injects code into the Windows Explorer (explorer.exe) 21->181 185 6 other signatures 21->185 38 explorer.exe 21->38         started        40 bfsvc.exe 21->40         started        43 cmd.exe 1 21->43         started        50 3 other processes 21->50 45 RegHost.exe 26->45         started        183 Hides threads from debuggers 28->183 48 conhost.exe 28->48         started        52 2 other processes 30->52 54 2 other processes 32->54 56 2 other processes 36->56 file10 signatures11 process12 dnsIp13 58 RegHost.exe 38->58         started        187 Hides threads from debuggers 40->187 62 conhost.exe 40->62         started        64 7z.exe 2 43->64         started        67 conhost.exe 43->67         started        155 185.199.110.133, 443, 49858, 49861 FASTLYUS Netherlands 45->155 157 raw.githubusercontent.com 45->157 159 github.com 45->159 189 Query firmware table information (likely to detect VMs) 45->189 191 Injects code into the Windows Explorer (explorer.exe) 45->191 193 Writes to foreign memory regions 45->193 195 4 other signatures 45->195 69 explorer.exe 45->69         started        71 bfsvc.exe 45->71         started        75 3 other processes 45->75 73 7z.exe 50->73         started        77 3 other processes 50->77 signatures14 process15 dnsIp16 139 185.199.109.133, 443, 49870, 49873 FASTLYUS Netherlands 58->139 141 raw.githubusercontent.com 58->141 143 github.com 58->143 197 Query firmware table information (likely to detect VMs) 58->197 199 Tries to detect sandboxes / dynamic malware analysis system (registry check) 58->199 79 cmd.exe 58->79         started        81 conhost.exe 58->81         started        107 C:\Users\user\AppData\...\RegHost_Temp.exe, PE32+ 64->107 dropped 83 RegHost.exe 69->83         started        109 \Device\ConDrv, ASCII 71->109 dropped 201 Hides threads from debuggers 71->201 87 conhost.exe 71->87         started        111 C:\Users\user\AppData\...\RegData_Temp.exe, PE32+ 73->111 dropped 89 conhost.exe 75->89         started        91 7z.exe 75->91         started        93 conhost.exe 75->93         started        95 7z.exe 75->95         started        145 api.telegram.org 149.154.167.220, 443, 49757 TELEGRAMRU United Kingdom 77->145 file17 signatures18 process19 dnsIp20 97 conhost.exe 79->97         started        99 7z.exe 79->99         started        129 raw.githubusercontent.com 83->129 131 github.com 83->131 169 Query firmware table information (likely to detect VMs) 83->169 171 Modifies the context of a thread in another process (thread injection) 83->171 173 Injects a PE file into a foreign processes 83->173 175 Tries to detect sandboxes / dynamic malware analysis system (registry check) 83->175 101 cmd.exe 83->101         started        103 conhost.exe 83->103         started        signatures21 process22 process23 105 conhost.exe 101->105         started       
Threat name:
Win32.Trojan.RedLineSteal
Status:
Malicious
First seen:
2021-12-05 22:46:18 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RedLine
RedLine Payload
Unpacked files
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
7e0150a3d7bbc38f40afa31e78a1e280954ccea8211f98f32e2c65ec96bde43c
MD5 hash:
deb60a23233d6e4ba4e9048b65c9cd50
SHA1 hash:
f16cc16b817e772e20cd44f9d82b06a14ef6ffdb
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 7e0150a3d7bbc38f40afa31e78a1e280954ccea8211f98f32e2c65ec96bde43c

(this sample)

  
Delivery method
Distributed via web download

Comments