MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7f95f170e448fb3dbbcc9e3b95a83b53fafcf4867fbc8a14cdeb41560458bca2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments

SHA256 hash: 7f95f170e448fb3dbbcc9e3b95a83b53fafcf4867fbc8a14cdeb41560458bca2
SHA3-384 hash: 41fa94798f42c0f9e98a09ae91da1a3c52d0fcd94b84aa819228ed395ee6eb11063fc14fbba805a558117694cc263fd7
SHA1 hash: cb558d1f58a275da843880d1a12e3426852bd0d3
MD5 hash: a1a2ad9051d5c14b526b6e94354a7eaf
humanhash: alabama-may-cold-kitten
File name:a1a2ad9051d5c14b526b6e94354a7eaf.exe
Download: download sample
Signature RedLineStealer
File size:367'616 bytes
First seen:2022-03-25 17:11:06 UTC
Last seen:2022-03-25 18:36:02 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0aa6e337c2cfd6bc7063b3211897b34e (8 x RedLineStealer, 2 x Stop, 1 x Smoke Loader)
ssdeep 6144:VZu9TnIC4EJy9BLEc4W3ncQ0IYQuApKrJNxNfXKgUinGF8lfTKmo:VZEnIC4EJyvx4W3J01QuAoDxNf6nibK
Threatray 5'259 similar samples on MalwareBazaar
TLSH T14E74C000BB90D035E0B752F8497AD3A8BA3E7AB15B2450CB72D56BEA16357E4EC31317
File icon (PE):PE icon
dhash icon 8ccc9e6c2a8edcde (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.106.191.123:34450

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.106.191.123:34450 https://threatfox.abuse.ch/ioc/447555/

Intelligence


File Origin
# of uploads :
2
# of downloads :
206
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Creating a file
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Stealing user critical data
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CheckCmdLine
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Raccrypt
Status:
Malicious
First seen:
2022-03-25 17:11:15 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
Unpacked files
SH256 hash:
7f95f170e448fb3dbbcc9e3b95a83b53fafcf4867fbc8a14cdeb41560458bca2
MD5 hash:
a1a2ad9051d5c14b526b6e94354a7eaf
SHA1 hash:
cb558d1f58a275da843880d1a12e3426852bd0d3
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 7f95f170e448fb3dbbcc9e3b95a83b53fafcf4867fbc8a14cdeb41560458bca2

(this sample)

  
Delivery method
Distributed via web download

Comments