MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7ee9fb0abc60de5047fb5e85cafc5a05383978bb1653a8ae824437488238d611. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments 1

SHA256 hash: 7ee9fb0abc60de5047fb5e85cafc5a05383978bb1653a8ae824437488238d611
SHA3-384 hash: 8403b2a2f3d8cc5875bf8c70a4ea2967ae884bcaa22c2785b51cf2874c028d8f0525823f0940e45b8ef54f3b74f39e15
SHA1 hash: 7387f57dd42a398bafc8186d538b627bc92e21b7
MD5 hash: 44faf6032125df3f25ae4c5cdf95b542
humanhash: don-autumn-maine-shade
File name:44faf6032125df3f25ae4c5cdf95b542
Download: download sample
Signature RedLineStealer
File size:4'392'960 bytes
First seen:2021-11-22 16:42:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e48cc266501c282987b27f2c1f654e2d (52 x RedLineStealer, 3 x RaccoonStealer)
ssdeep 98304:Lh0siPYew4050JgJwq4kMlCTtqvJikb3EbOL9cI:Lh05xwh50aYhD3zL9/
TLSH T17F16338160BFF579E9AF03B45957B67D2A25D140624FDE4F7A1F9E8BC81813C82A18F0
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
44faf6032125df3f25ae4c5cdf95b542
Verdict:
Malicious activity
Analysis date:
2021-11-22 17:09:15 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Creating a file
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
BitCoin Miner RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Creates a thread in another existing process (thread injection)
Detected unpacking (changes PE section rights)
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 526510 Sample: NNWHZ35rbe Startdate: 22/11/2021 Architecture: WINDOWS Score: 100 97 Multi AV Scanner detection for submitted file 2->97 99 Yara detected BitCoin Miner 2->99 101 Yara detected RedLine Stealer 2->101 103 4 other signatures 2->103 13 NNWHZ35rbe.exe 2->13         started        16 services32.exe 2->16         started        process3 signatures4 153 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->153 155 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 13->155 157 Writes to foreign memory regions 13->157 165 3 other signatures 13->165 18 AppLaunch.exe 15 7 13->18         started        23 WerFault.exe 23 9 13->23         started        159 Antivirus detection for dropped file 16->159 161 Detected unpacking (changes PE section rights) 16->161 163 Machine Learning detection for dropped file 16->163 167 3 other signatures 16->167 25 conhost.exe 16->25         started        process5 dnsIp6 91 saninolece.xyz 94.140.112.97, 49756, 80 TELEMACHBroadbandAccessCarrierServicesSI Latvia 18->91 93 bitbucket.org 104.192.141.1, 443, 49762 AMAZON-02US United States 18->93 95 5 other IPs or domains 18->95 87 C:\Users\user\AppData\Local\Temp\hman.exe, PE32+ 18->87 dropped 119 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->119 121 Performs DNS queries to domains with low reputation 18->121 123 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->123 127 2 other signatures 18->127 27 hman.exe 18->27         started        89 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 23->89 dropped 125 Adds a directory exclusion to Windows Defender 25->125 30 cmd.exe 25->30         started        32 cmd.exe 25->32         started        file7 signatures8 process9 signatures10 137 Antivirus detection for dropped file 27->137 139 Detected unpacking (changes PE section rights) 27->139 141 Machine Learning detection for dropped file 27->141 145 4 other signatures 27->145 34 conhost.exe 4 27->34         started        143 Adds a directory exclusion to Windows Defender 30->143 38 conhost.exe 30->38         started        40 powershell.exe 30->40         started        42 conhost.exe 32->42         started        process11 file12 83 C:\Windows\System32\services32.exe, PE32+ 34->83 dropped 105 Adds a directory exclusion to Windows Defender 34->105 44 cmd.exe 34->44         started        47 cmd.exe 1 34->47         started        49 cmd.exe 34->49         started        signatures13 process14 signatures15 147 Drops executables to the windows directory (C:\Windows) and starts them 44->147 51 services32.exe 44->51         started        54 conhost.exe 44->54         started        149 Uses schtasks.exe or at.exe to add and modify task schedules 47->149 151 Adds a directory exclusion to Windows Defender 47->151 56 powershell.exe 20 47->56         started        58 conhost.exe 47->58         started        60 powershell.exe 47->60         started        62 conhost.exe 49->62         started        64 schtasks.exe 49->64         started        process16 signatures17 107 Writes to foreign memory regions 51->107 109 Allocates memory in foreign processes 51->109 111 Hides threads from debuggers 51->111 113 Creates a thread in another existing process (thread injection) 51->113 66 conhost.exe 51->66         started        process18 file19 85 C:\Windows\System32\...\sihost32.exe, PE32+ 66->85 dropped 115 Drops executables to the windows directory (C:\Windows) and starts them 66->115 117 Adds a directory exclusion to Windows Defender 66->117 70 sihost32.exe 66->70         started        73 cmd.exe 66->73         started        signatures20 process21 signatures22 129 Writes to foreign memory regions 70->129 131 Allocates memory in foreign processes 70->131 133 Creates a thread in another existing process (thread injection) 70->133 75 conhost.exe 70->75         started        135 Adds a directory exclusion to Windows Defender 73->135 77 conhost.exe 73->77         started        79 powershell.exe 73->79         started        81 powershell.exe 73->81         started        process23
Threat name:
Win32.Spyware.Sabsik
Status:
Suspicious
First seen:
2021-11-22 08:29:20 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 28 (67.86%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Unpacked files
SH256 hash:
db86a36a1b4a751bbcda41a0c77fbf8a14268e3834d75781db015a577449aff4
MD5 hash:
7edc5fe3898a1587d7bce0cc9fef2abc
SHA1 hash:
72506680b88d57200bec6461fc9403fce0588613
SH256 hash:
7ee9fb0abc60de5047fb5e85cafc5a05383978bb1653a8ae824437488238d611
MD5 hash:
44faf6032125df3f25ae4c5cdf95b542
SHA1 hash:
7387f57dd42a398bafc8186d538b627bc92e21b7
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 7ee9fb0abc60de5047fb5e85cafc5a05383978bb1653a8ae824437488238d611

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-22 16:42:08 UTC

url : hxxp://host-file-host9.com/files/2972_1637414223_8348.exe