MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 86f4809b73e73c837784b2a9a449d1d56f34ea22bd30b99a555962683113cde7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: 86f4809b73e73c837784b2a9a449d1d56f34ea22bd30b99a555962683113cde7
SHA3-384 hash: f5bf25dc2df06fd7ccbb1dcc3c9990943dc6a85c58f0279e4836fc3207b5882ec469c4c7bc8c949f98bc27fb004ae0ab
SHA1 hash: 879e179247214c9d743a1608e0ea81df2c38ea00
MD5 hash: cce1e2e1009bf1324dc88501a586b3a2
humanhash: fanta-alabama-eleven-autumn
File name:HershyMM.exe
Download: download sample
Signature RedLineStealer
File size:4'753'408 bytes
First seen:2021-10-24 19:21:25 UTC
Last seen:2021-10-24 20:22:14 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 908bea7ee71339f1c35ba419da3ba679 (36 x RedLineStealer, 2 x RaccoonStealer)
ssdeep 98304:NLBooYPzXz/wdgO3EO5WFtnePITCKDnGvWwjbD2gnGxwl3X/O3uA:rYPDz/wl5+neg2K7yNjbVNlHu
Threatray 78 similar samples on MalwareBazaar
TLSH T1E8261223E2680841E4A18A75493BFEB031F66F258BAD987A45F97CE337332D2B115D47
File icon (PE):PE icon
dhash icon 2b2b132ba7454dce (2 x RedLineStealer)
Reporter tech_skeech
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
313
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
HershyMM.exe
Verdict:
Malicious activity
Analysis date:
2021-10-24 19:19:51 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Detected VMProtect packer
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 508294 Sample: HershyMM.exe Startdate: 24/10/2021 Architecture: WINDOWS Score: 100 106 Multi AV Scanner detection for submitted file 2->106 108 Detected VMProtect packer 2->108 110 Machine Learning detection for sample 2->110 112 2 other signatures 2->112 13 HershyMM.exe 2->13         started        16 services32.exe 2->16         started        process3 signatures4 162 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->162 164 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 13->164 166 Writes to foreign memory regions 13->166 168 Injects a PE file into a foreign processes 13->168 18 AppLaunch.exe 15 7 13->18         started        23 WerFault.exe 23 9 13->23         started        170 Multi AV Scanner detection for dropped file 16->170 172 Allocates memory in foreign processes 16->172 174 Tries to detect virtualization through RDTSC time measurements 16->174 176 Creates a thread in another existing process (thread injection) 16->176 25 conhost.exe 16->25         started        process5 dnsIp6 96 185.209.22.181, 29234, 49753 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 18->96 98 cdn.discordapp.com 162.159.129.233, 443, 49758 CLOUDFLARENETUS United States 18->98 90 C:\Users\user\AppData\Local\Temp\build.exe, PE32+ 18->90 dropped 122 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->122 124 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->124 126 Tries to harvest and steal browser information (history, passwords, etc) 18->126 128 Tries to steal Crypto Currency Wallets 18->128 27 build.exe 18->27         started        92 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 23->92 dropped 130 Adds a directory exclusion to Windows Defender 25->130 30 cmd.exe 25->30         started        32 cmd.exe 25->32         started        file7 signatures8 process9 signatures10 142 Multi AV Scanner detection for dropped file 27->142 144 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 27->144 146 Writes to foreign memory regions 27->146 150 3 other signatures 27->150 34 conhost.exe 4 27->34         started        148 Adds a directory exclusion to Windows Defender 30->148 38 conhost.exe 30->38         started        40 powershell.exe 30->40         started        42 powershell.exe 30->42         started        44 conhost.exe 32->44         started        46 taskkill.exe 32->46         started        process11 file12 88 C:\Users\user\services32.exe, PE32+ 34->88 dropped 118 Drops PE files to the user root directory 34->118 120 Adds a directory exclusion to Windows Defender 34->120 48 cmd.exe 34->48         started        50 cmd.exe 1 34->50         started        53 cmd.exe 1 34->53         started        signatures13 process14 signatures15 55 services32.exe 48->55         started        58 conhost.exe 48->58         started        114 Uses schtasks.exe or at.exe to add and modify task schedules 50->114 116 Adds a directory exclusion to Windows Defender 50->116 60 powershell.exe 23 50->60         started        62 conhost.exe 50->62         started        64 powershell.exe 50->64         started        66 conhost.exe 53->66         started        68 schtasks.exe 1 53->68         started        process16 signatures17 132 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 55->132 134 Writes to foreign memory regions 55->134 136 Allocates memory in foreign processes 55->136 138 Creates a thread in another existing process (thread injection) 55->138 70 conhost.exe 55->70         started        process18 dnsIp19 100 github.com 140.82.121.3, 443, 49765 GITHUBUS United States 70->100 102 raw.githubusercontent.com 185.199.108.133, 443, 49766 FASTLYUS Netherlands 70->102 104 sanctam.net 70->104 94 C:\Users\user\AppData\...\sihost32.exe, PE32+ 70->94 dropped 140 Adds a directory exclusion to Windows Defender 70->140 75 sihost32.exe 70->75         started        78 cmd.exe 70->78         started        file20 signatures21 process22 signatures23 152 Multi AV Scanner detection for dropped file 75->152 154 Writes to foreign memory regions 75->154 156 Allocates memory in foreign processes 75->156 158 Creates a thread in another existing process (thread injection) 75->158 80 conhost.exe 75->80         started        160 Adds a directory exclusion to Windows Defender 78->160 82 conhost.exe 78->82         started        84 powershell.exe 78->84         started        86 powershell.exe 78->86         started        process24
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2021-10-24 19:22:08 UTC
AV detection:
18 of 45 (40.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline infostealer spyware vmprotect
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
957dc0f43fa140531b20bc4c2dad3fac56b1968126a9100f6423414b2f1ea149
MD5 hash:
ed72b0a53457cc9ba2c20dfe4a251bd4
SHA1 hash:
6f4f58adf9739fedcee0b34140165e30f8a70e75
SH256 hash:
86f4809b73e73c837784b2a9a449d1d56f34ea22bd30b99a555962683113cde7
MD5 hash:
cce1e2e1009bf1324dc88501a586b3a2
SHA1 hash:
879e179247214c9d743a1608e0ea81df2c38ea00
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 86f4809b73e73c837784b2a9a449d1d56f34ea22bd30b99a555962683113cde7

(this sample)

Comments