MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 81ac26195a0bb330281e63a60b78379989c51700fee1c6c8c8e288632864fcbd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 3 File information Comments

SHA256 hash: 81ac26195a0bb330281e63a60b78379989c51700fee1c6c8c8e288632864fcbd
SHA3-384 hash: a975995a424a0dfb451d4767002e28b5e7051341eb4e887cd00b6384aad15af39166aa7f2690347753abfdc964c33291
SHA1 hash: 4139bf8f09e5eb11a5965f42b5a67f79f054125f
MD5 hash: fff086cc6f66fb03ecced9d259bebbda
humanhash: saturn-cup-florida-social
File name:ePayment pdf.exe
Download: download sample
Signature RedLineStealer
File size:289'280 bytes
First seen:2022-11-13 21:30:05 UTC
Last seen:2022-11-13 23:40:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 453590f7e5e2a6169477ebee495e0b96 (2 x RedLineStealer, 2 x Smoke Loader, 1 x Tofsee)
ssdeep 6144:tCLLm7PLG1kEW+x9wf2XUjDRxIfzIb14kdT8e:sG7T6bW+vwusDDsz8v
Threatray 11'352 similar samples on MalwareBazaar
TLSH T111540110BA50D033C15545316B34C3E19A3BBDB2A97AC9877B943BAE9F711C0B67970B
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 25ac137039939b91 (15 x Smoke Loader, 12 x Amadey, 6 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
104.37.174.31:27620

Intelligence


File Origin
# of uploads :
2
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
ePayment pdf.exe
Verdict:
Malicious activity
Analysis date:
2022-11-13 21:34:25 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Searching for the window
Launching the default Windows debugger (dwwin.exe)
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Executable has a suspicious name (potential lure to open the executable)
Found many strings related to Crypto-Wallets (likely being stolen)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.RedLine
Status:
Malicious
First seen:
2022-11-13 21:08:26 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
28 of 41 (68.29%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:evilline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine payload
Malware Config
C2 Extraction:
104.37.174.31:27620
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
c23ab5f0df93735c135df2767123cac2d67563b15db505ff4150dd37761d7251
MD5 hash:
be2c9a2b21cae216f3e51fe78593a7bf
SHA1 hash:
987b1a869c3252c2fdfed232cb6fd18748dcf26f
Detections:
redline
SH256 hash:
a0d74134402b061b1ed431a536b0713b8a6179cfe14c1a19008331407763d4d3
MD5 hash:
f563f1e1c40bb6fe7fbd77c216a3bf90
SHA1 hash:
61519e0d7f2683e1a2884812a2736b73b0d2f036
SH256 hash:
1162fe4e8e08bf45cfbe85ca0841366aafa6eceb3331796117cfb42f81926bb6
MD5 hash:
639047ec170ea53dac101949630b0eb0
SHA1 hash:
3367fbfeb7669385eb40015db9996a66d950738a
Detections:
redline
SH256 hash:
81ac26195a0bb330281e63a60b78379989c51700fee1c6c8c8e288632864fcbd
MD5 hash:
fff086cc6f66fb03ecced9d259bebbda
SHA1 hash:
4139bf8f09e5eb11a5965f42b5a67f79f054125f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments