MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 852a677fbc8242015c84b8d00234ea00eb5be4a10c0eef80b2ab17dd3471496e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 1 File information Comments

SHA256 hash: 852a677fbc8242015c84b8d00234ea00eb5be4a10c0eef80b2ab17dd3471496e
SHA3-384 hash: 7db6842c6473005038c025b181a7b43acaeb2f69c2e9768871ded1e19e6585232477bb9abff698cc792d4a2d1495a52d
SHA1 hash: 57f06478490ad8814e05cfb3d9b15690d4a2d44f
MD5 hash: 4a6017c764f1df5eb66c513f90cd6804
humanhash: skylark-juliet-neptune-pluto
File name:PrimogemsGlitch.exe
Download: download sample
Signature RedLineStealer
File size:2'456'953 bytes
First seen:2021-10-24 16:08:48 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash a1a66d588dcf1394354ebf6ec400c223 (49 x RedLineStealer, 7 x CryptBot, 4 x AZORult)
ssdeep 49152:85+hF7Szy8gLd+U4fEof0gcYzkbtD+euTBDWr1U13zBxiz8lVHTIioOFZQ+a:85aF72kd+P2gcQV6Q3zBxiqZ7a
Threatray 272 similar samples on MalwareBazaar
TLSH T1EFB52331AAD6B3F7E05B3772C8C0737A76F1E2160F9755DBA6909602B8127E0C1B9252
File icon (PE):PE icon
dhash icon 6192a6a6a6a6c401 (17 x RedLineStealer, 11 x PythonStealer, 9 x DCRat)
Reporter tech_skeech
Tags:CoinMiner exe RedLineStealer

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
62.182.156.24:12780 https://threatfox.abuse.ch/ioc/236934/

Intelligence


File Origin
# of uploads :
1
# of downloads :
455
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PrimogemsGlitch.exe
Verdict:
Suspicious activity
Analysis date:
2021-10-24 16:04:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a process
Moving a file to the %temp% subdirectory
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Creates a thread in another existing process (thread injection)
Drops PE files to the user root directory
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 508261 Sample: PrimogemsGlitch.exe Startdate: 24/10/2021 Architecture: WINDOWS Score: 100 116 Multi AV Scanner detection for submitted file 2->116 118 Connects to many ports of the same IP (likely port scanning) 2->118 120 Uses known network protocols on non-standard ports 2->120 122 Sigma detected: Powershell Defender Exclusion 2->122 12 PrimogemsGlitch.exe 7 2->12         started        16 services32.exe 2->16         started        process3 file4 96 C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32+ 12->96 dropped 98 C:\Users\user\AppData\Local\Temp\...\7z.dll, PE32+ 12->98 dropped 170 Contains functionality to register a low level keyboard hook 12->170 18 cmd.exe 2 12->18         started        172 Machine Learning detection for dropped file 16->172 174 Writes to foreign memory regions 16->174 176 Allocates memory in foreign processes 16->176 178 Creates a thread in another existing process (thread injection) 16->178 21 conhost.exe 16->21         started        signatures5 process6 dnsIp7 124 Uses schtasks.exe or at.exe to add and modify task schedules 18->124 126 Adds a directory exclusion to Windows Defender 18->126 24 7z.exe 2 18->24         started        27 bild.exe 15 7 18->27         started        31 conhost.exe 18->31         started        35 13 other processes 18->35 100 sanctam.net 21->100 102 github.com 140.82.121.3, 443, 49761 GITHUBUS United States 21->102 104 raw.githubusercontent.com 185.199.108.133, 443, 49762 FASTLYUS Netherlands 21->104 33 cmd.exe 21->33         started        signatures8 process9 dnsIp10 92 C:\Users\user\AppData\Local\Temp\...\bild.exe, PE32 24->92 dropped 37 cmd.exe 24->37         started        39 cmd.exe 24->39         started        42 cmd.exe 24->42         started        112 62.182.156.24, 12780, 49716, 49746 AutonomousSystemofBaunetworks-SerbiaRS Russian Federation 27->112 114 192.168.2.1 unknown unknown 27->114 94 C:\Users\user\AppData\Local\Temp\sys32.exe, PE32+ 27->94 dropped 158 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 27->158 160 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 27->160 162 Tries to harvest and steal browser information (history, passwords, etc) 27->162 164 Tries to steal Crypto Currency Wallets 27->164 44 sys32.exe 27->44         started        166 Drops PE files to the user root directory 31->166 168 Adds a directory exclusion to Windows Defender 31->168 46 conhost.exe 33->46         started        48 powershell.exe 33->48         started        50 powershell.exe 33->50         started        file11 signatures12 process13 signatures14 52 services32.exe 37->52         started        55 conhost.exe 37->55         started        136 Adds a directory exclusion to Windows Defender 39->136 57 conhost.exe 39->57         started        59 powershell.exe 39->59         started        61 powershell.exe 39->61         started        63 conhost.exe 42->63         started        65 schtasks.exe 42->65         started        138 Machine Learning detection for dropped file 44->138 140 Writes to foreign memory regions 44->140 142 Allocates memory in foreign processes 44->142 144 Creates a thread in another existing process (thread injection) 44->144 67 conhost.exe 44->67         started        process15 file16 128 Writes to foreign memory regions 52->128 130 Allocates memory in foreign processes 52->130 132 Creates a thread in another existing process (thread injection) 52->132 70 conhost.exe 52->70         started        88 C:\Users\user\services32.exe, PE32+ 67->88 dropped 134 Adds a directory exclusion to Windows Defender 67->134 signatures17 process18 dnsIp19 106 sanctam.net 70->106 108 140.82.121.4, 443, 49763 GITHUBUS United States 70->108 110 3 other IPs or domains 70->110 90 C:\Users\user\AppData\...\sihost32.exe, PE32+ 70->90 dropped 146 Adds a directory exclusion to Windows Defender 70->146 75 sihost32.exe 70->75         started        78 cmd.exe 70->78         started        file20 signatures21 process22 signatures23 148 Multi AV Scanner detection for dropped file 75->148 150 Writes to foreign memory regions 75->150 152 Allocates memory in foreign processes 75->152 154 Creates a thread in another existing process (thread injection) 75->154 80 conhost.exe 75->80         started        156 Adds a directory exclusion to Windows Defender 78->156 82 conhost.exe 78->82         started        84 powershell.exe 78->84         started        86 powershell.exe 78->86         started        process24
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-10-24 10:45:03 UTC
AV detection:
13 of 44 (29.55%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@geniyvsego discovery infostealer spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Drops file in System32 directory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
62.182.156.24:12780
Unpacked files
SH256 hash:
e406fa1949dad9312f1ceef543f349304e1b23bf42e787027e6edcd0e016ee17
MD5 hash:
a0459a2384f5fb1602a72b05ab529ae7
SHA1 hash:
cfe83f14041940167e8adbeb4721e07191ca3c3d
SH256 hash:
852a677fbc8242015c84b8d00234ea00eb5be4a10c0eef80b2ab17dd3471496e
MD5 hash:
4a6017c764f1df5eb66c513f90cd6804
SHA1 hash:
57f06478490ad8814e05cfb3d9b15690d4a2d44f
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 852a677fbc8242015c84b8d00234ea00eb5be4a10c0eef80b2ab17dd3471496e

(this sample)

Comments