MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 90082f2488d59759b0471e9f4b0f5df72466dcb8bed29a9939a33cb6defe9192. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 4 File information Comments

SHA256 hash: 90082f2488d59759b0471e9f4b0f5df72466dcb8bed29a9939a33cb6defe9192
SHA3-384 hash: 9897b5c715a3576862d6273e2c26242ce779cfecbb0ba9753b6e74938dc7906635726ca9f0454ffe003e8cc7f7814993
SHA1 hash: 2c81f967144b8ef1a3aa083fa3890eb4be0897aa
MD5 hash: 7e148bc866fd91b339be35b1657ec09f
humanhash: ack-neptune-floor-diet
File name:renderer771.exe
Download: download sample
Signature RedLineStealer
File size:390'144 bytes
First seen:2023-05-21 08:41:18 UTC
Last seen:2023-05-21 11:10:01 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash bb27c4958c76443fcfe46f9765d838a2 (9 x Stop, 5 x RedLineStealer, 4 x GCleaner)
ssdeep 6144:HHONY2iG2CW1VVCzGBU69fOEjCuiZ1CUZc7smRkTTH:HSYo2H4GR9fJCu41CGakH
Threatray 51 similar samples on MalwareBazaar
TLSH T1E484C022B2D1E872E5554E31CD2AC6F8662EB861BF1516CB3374EF6F18301E2D63A741
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 08b084a4a0a484a0 (1 x RedLineStealer)
Reporter Neiki
Tags:RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
96
Origin country :
DE DE
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
renderer771.exe
Verdict:
Malicious activity
Analysis date:
2023-05-21 08:54:29 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.SmokeLoader
Status:
Malicious
First seen:
2023-05-21 08:42:24 UTC
File Type:
PE (Exe)
Extracted files:
35
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine payload
Unpacked files
SH256 hash:
96ba3dbee2d373d283c8d9650f60efe94826accef0d04220f0f58febf89c3ba8
MD5 hash:
7e20d435b2daeba67de940e2f0f129f2
SHA1 hash:
d0d577d88068fa8081c2cd07fe14a3e5cd55496b
Detections:
redline
Parent samples :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 hash:
45fe4b223644f5606fb6eb4ce432c6843a57382d1079491055a30b39fec193a1
MD5 hash:
8732bc3849511234e77d504b65ba9b9b
SHA1 hash:
918ec526493fe4cf2ce16a3d459cd1f7bd8e490d
SH256 hash:
336464ee3d91a1f376d0dd9690a7d94d5ac8d09a1a610de605ca257a9911e59b
MD5 hash:
9fe0cf5474c7e9e74e6f4d82e1c8effa
SHA1 hash:
7e18ccc41b0e8f7f0207b78f6f855fa08c24577c
Detections:
redline
Parent samples :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 hash:
90082f2488d59759b0471e9f4b0f5df72466dcb8bed29a9939a33cb6defe9192
MD5 hash:
7e148bc866fd91b339be35b1657ec09f
SHA1 hash:
2c81f967144b8ef1a3aa083fa3890eb4be0897aa
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments