MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 83b48c19f58ad284a16653a1e4eb298f18dc4a8d5931f3a5b408a8501516f809. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments

SHA256 hash: 83b48c19f58ad284a16653a1e4eb298f18dc4a8d5931f3a5b408a8501516f809
SHA3-384 hash: 32062984e9f9400fdf4c12f039996b46372da9d0e7ad72bf9c5fe5d8d2d8aee993c2ce91c69bf732616474aa3fc407b8
SHA1 hash: ff5c7d7ea7a8c616d5104b8334a479119489eeaa
MD5 hash: d1f6eb5442faa972aaf446916399a0a7
humanhash: minnesota-nineteen-eleven-queen
File name:d1f6eb5442faa972aaf446916399a0a7.exe
Download: download sample
Signature RedLineStealer
File size:342'528 bytes
First seen:2021-08-22 13:41:19 UTC
Last seen:2021-08-22 14:51:25 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b5f293e51015d9eef9ae7288b63a4f2b (3 x RaccoonStealer, 2 x RedLineStealer)
ssdeep 6144:DGoylM4Q/T/JX++5FwBE7EH2FSKt6DsVzBv1QW/tN:pKMnr/JVFwBf2EDsPN
Threatray 4'953 similar samples on MalwareBazaar
TLSH T10274AE3076A0C035E5F712F895BAC3B8692A7D71DB3091CB62D526EA26387E4DC31397
dhash icon ead8ac9cc6e68ea0 (38 x RaccoonStealer, 18 x RedLineStealer, 12 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.38.55.57:7575

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.38.55.57:7575 https://threatfox.abuse.ch/ioc/192588/

Intelligence


File Origin
# of uploads :
2
# of downloads :
132
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d1f6eb5442faa972aaf446916399a0a7.exe
Verdict:
Malicious activity
Analysis date:
2021-08-22 13:42:38 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sending an HTTP POST request
Sending a UDP request
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a file
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
92 / 100
Signature
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-08-22 13:42:06 UTC
AV detection:
18 of 46 (39.13%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
193.38.55.57:7575
Unpacked files
SH256 hash:
a7cbe97a9a0e72247ac9adc920370ebd7047e930a6f29481070647a4e13f4388
MD5 hash:
b715cf592b142e2439ac04e4584ffaff
SHA1 hash:
ce0cab7f1fa7f6830e764edf164365f8357771b1
SH256 hash:
02870ec80d34649f4babf75a5e25d5d9ff979a9d02af0d94f5ecffd43508c464
MD5 hash:
334daf946e36227115cea10d53386034
SHA1 hash:
3638569980e9911f7dbc59a613411d95521e5aa0
SH256 hash:
1b25fdebbda332f7c6300aea2d7e3e0932674718187edda1aebafcc72b147b67
MD5 hash:
05ae28c772c4c22d5ba1c70d551c7675
SHA1 hash:
33964a9fd49845344786e35d6aba02593f356bc3
SH256 hash:
83b48c19f58ad284a16653a1e4eb298f18dc4a8d5931f3a5b408a8501516f809
MD5 hash:
d1f6eb5442faa972aaf446916399a0a7
SHA1 hash:
ff5c7d7ea7a8c616d5104b8334a479119489eeaa
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 83b48c19f58ad284a16653a1e4eb298f18dc4a8d5931f3a5b408a8501516f809

(this sample)

  
Delivery method
Distributed via web download

Comments