MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 83dac1d4055156cbe77b497bddee7e321dda31ddd4ea7e6493a2d53742106f3d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 8 File information Comments

SHA256 hash: 83dac1d4055156cbe77b497bddee7e321dda31ddd4ea7e6493a2d53742106f3d
SHA3-384 hash: 5c02d0490e3392326f2116d50c7e671a59c3e95b2eda5d704bc7a6a54cbe11327b614c5cfc85ed4077a58d3bea823522
SHA1 hash: 784c4612311008a98b02bbdd698fb4f0ececec74
MD5 hash: 7e0eb4a4061e5b9ea072089a27bd9659
humanhash: maryland-speaker-avocado-stairway
File name:file
Download: download sample
Signature RedLineStealer
File size:1'637'035 bytes
First seen:2023-03-08 19:59:48 UTC
Last seen:2023-03-10 09:21:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 49152:V5OwywU4JRi1zMFPqLjqmAWWyLBS/R4b2Bic1d:V5T3H8YFkq3gA54bQb
Threatray 1'250 similar samples on MalwareBazaar
TLSH T15E752342F6D684F1E621443299286B62A87CBE302F14CFAF73C85D6DD934191E635AB3
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from https://vk.com/doc10773776_660817187?hash=MoPiZ39ZztNLxflcnzROZdTIdSUtRZZOlmjpMesl8DP&dl=GEYDONZTG43TM:1678294484:FU5RFHhFKRdKlZUg2HhfcRB1eMSoqX4z0Wf4PEIK5hH&api=1&no_preview=1#1

Intelligence


File Origin
# of uploads :
5
# of downloads :
234
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-03-08 20:00:47 UTC
Tags:
rat redline evasion stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Creating a process from a recently created file
Launching a process
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending an HTTP GET request
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Sending a TCP request to an infection source
Unauthorized injection to a system process
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug greyware overlay packed packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an autostart registry key pointing to binary in C:\Windows
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Schedule binary from dotnet directory
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 822620 Sample: file.exe Startdate: 08/03/2023 Architecture: WINDOWS Score: 100 89 Snort IDS alert for network traffic 2->89 91 Malicious sample detected (through community Yara rule) 2->91 93 Antivirus detection for URL or domain 2->93 95 8 other signatures 2->95 10 file.exe 7 2->10         started        13 RegSvcs.exe 2->13         started        15 RegSvcs.exe 2->15         started        17 RegSvcs.exe 2->17         started        process3 file4 65 C:\Windows\Temp\321.exe, PE32 10->65 dropped 67 C:\Windows\Temp\1234.exe, PE32 10->67 dropped 69 C:\Windows\Temp\123.exe, PE32 10->69 dropped 19 123.exe 1 10->19         started        22 1234.exe 1 10->22         started        24 321.exe 15 67 10->24         started        27 conhost.exe 13->27         started        29 conhost.exe 15->29         started        31 conhost.exe 17->31         started        process5 dnsIp6 109 Machine Learning detection for dropped file 19->109 111 Contains functionality to inject code into remote processes 19->111 113 Writes to foreign memory regions 19->113 33 RegSvcs.exe 4 19->33         started        37 WerFault.exe 20 9 19->37         started        39 conhost.exe 19->39         started        115 Allocates memory in foreign processes 22->115 117 Injects a PE file into a foreign processes 22->117 41 RegSvcs.exe 22->41         started        43 conhost.exe 22->43         started        45 WerFault.exe 22->45         started        85 127.0.0.1 unknown unknown 24->85 119 Tries to harvest and steal browser information (history, passwords, etc) 24->119 47 chrome.exe 24->47         started        signatures7 process8 dnsIp9 71 51.89.204.181, 22299, 49739 OVHFR France 33->71 97 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 33->97 99 Suspicious powershell command line found 33->99 101 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 33->101 107 3 other signatures 33->107 73 ip-api.com 208.95.112.1, 49713, 80 TUT-ASUS United States 41->73 75 46.173.218.172, 49714, 80 GARANT-PARK-INTERNETRU Russian Federation 41->75 77 192.168.2.1 unknown unknown 41->77 103 Creates an autostart registry key pointing to binary in C:\Windows 41->103 105 Adds a directory exclusion to Windows Defender 41->105 49 powershell.exe 41->49         started        52 schtasks.exe 41->52         started        54 chrome.exe 47->54         started        signatures10 process11 dnsIp12 87 Adds a directory exclusion to Windows Defender 49->87 57 powershell.exe 49->57         started        59 conhost.exe 49->59         started        61 conhost.exe 52->61         started        79 plus.l.google.com 142.250.185.142, 443, 49731 GOOGLEUS United States 54->79 81 www.google.com 142.250.186.36, 443, 49516, 49726 GOOGLEUS United States 54->81 83 apis.google.com 54->83 signatures13 process14 process15 63 conhost.exe 57->63         started       
Threat name:
Win32.Trojan.Privateloader
Status:
Malicious
First seen:
2023-03-08 20:29:22 UTC
File Type:
PE (Exe)
Extracted files:
21
AV detection:
18 of 25 (72.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:logsdiller cloud (telegram: @logsdillabot) infostealer persistence spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
RedLine
Malware Config
C2 Extraction:
51.89.204.181:22299
Unpacked files
SH256 hash:
8fd9050296da3ac104206c8dd545bd630e4485f3e6a3ebb5c2aaa5a11ec0e3d3
MD5 hash:
e1ee81ead98210fb1644591b4d1efa6f
SHA1 hash:
c560718a03781c65200ac7ae4b93c125eaca22c1
SH256 hash:
dca5c28137628c69c8de6b1ad5f55adc79322e7558d27898ff56e3c38a929c74
MD5 hash:
c024917ef1232b89fc06b5b06e8f81a3
SHA1 hash:
9fe41140baa2e3e68fa4daa188b36df04a997741
SH256 hash:
9e0f59053407e3bab51cd834b9587f3ada58a01c7777f2e4a37f30e553fad9ae
MD5 hash:
29229cf00d9b109bb9a8e06cab9cf7a5
SHA1 hash:
727d5bd9f740497b23c44c16f97b5eeb21700b65
Detections:
redline
SH256 hash:
3d01804c9a792f4e966e549d1cfdeac3be14c9303169c17fb0c5bb866a04c763
MD5 hash:
8f7ae00a6ff26a2e4eaf9790aaf9833b
SHA1 hash:
bba6e79206cf6ba546baa4697313c1ed5ff181e5
SH256 hash:
83dac1d4055156cbe77b497bddee7e321dda31ddd4ea7e6493a2d53742106f3d
MD5 hash:
7e0eb4a4061e5b9ea072089a27bd9659
SHA1 hash:
784c4612311008a98b02bbdd698fb4f0ececec74
Malware family:
RedLine.E
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Redline_Hunter
Author:Potato
Description:Unpacked RedLine Hunter
Rule name:sfx_pdb
Author:@razvialex
Description:Detect interesting files containing sfx with pdb paths.
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Win32_Trojan_RedLineStealer
Author:Netskope Threat Labs
Description:Identifies RedLine Stealer samples
Reference:deb95cae4ba26dfba536402318154405

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments