MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8f0d919db4bd161024c7aa5987fecd56af2c251bfa54e0e61ae9f96dc5b437ac. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: 8f0d919db4bd161024c7aa5987fecd56af2c251bfa54e0e61ae9f96dc5b437ac
SHA3-384 hash: 2da32a189ac0662ea0385877f25be00b829f2958061a497c068545c836a177592e6e8e64da406399e96323068208abeb
SHA1 hash: 33619869ed8e4d749529fcd6202c90bceb18c756
MD5 hash: c6dc72d33c21c0f69612d33d29ad4ec9
humanhash: maine-west-beryllium-mississippi
File name:file
Download: download sample
Signature RedLineStealer
File size:421'376 bytes
First seen:2022-11-03 05:23:07 UTC
Last seen:2022-11-03 06:58:37 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash babefe8ee1a998f9b022d1c5e07ae8f5 (10 x RedLineStealer, 9 x Amadey, 9 x Smoke Loader)
ssdeep 6144:BBpL39mPZHU6fmjZYW9T+TNa5d/BK1LWuo62Kqf5sRLU:BBpT9EHmjZYU+TE5dZK16RKqf
Threatray 10'519 similar samples on MalwareBazaar
TLSH T15F94F12137A1C432C58264380976C6E03FBBFD3226A9454B7B94376F1F70392AA7975B
TrID 40.3% (.EXE) Win64 Executable (generic) (10523/12/4)
19.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
17.2% (.EXE) Win32 Executable (generic) (4505/5/1)
7.7% (.EXE) OS/2 Executable (generic) (2029/13)
7.6% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon b0b2b079e8cccc52 (1 x RedLineStealer)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://193.106.191.25/MicrosoftKeys.exe

Intelligence


File Origin
# of uploads :
6
# of downloads :
221
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2022-11-03 05:24:00 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connecting to a non-recommended domain
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Launching the default Windows debugger (dwwin.exe)
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2022-11-03 05:24:10 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
21 of 26 (80.77%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:mix discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
Malware Config
C2 Extraction:
193.106.191.25:47242
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
51892d247f4f58d22ff8200462f5b3c868a9f6b8a94b4df9dd2f58d0b577c5a9
MD5 hash:
71b425ef67ab42737177e4bea2dd661d
SHA1 hash:
a0d4950e8cccfcd4a15e8ccaa68a97a7501c405b
SH256 hash:
298662bcb95f8f6b9a3baa60ac5b08633ba088e1ebce5138b648dc551e690fca
MD5 hash:
2e0087e1d39a4212fec48bcb1f863e37
SHA1 hash:
7110d9b358226d73af10a8c01efa1d907a77c8d5
Detections:
redline
Parent samples :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 hash:
8ddc4e7fc854e80d6e804f4d51a89756b756958ea2562b422513005cdbe56aae
MD5 hash:
73db388ea5561e03cc9a1f9dd801ee73
SHA1 hash:
05422a8e87925b2951f2e1c0e2eb7275096850d4
Detections:
redline
Parent samples :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 hash:
8f0d919db4bd161024c7aa5987fecd56af2c251bfa54e0e61ae9f96dc5b437ac
MD5 hash:
c6dc72d33c21c0f69612d33d29ad4ec9
SHA1 hash:
33619869ed8e4d749529fcd6202c90bceb18c756
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments