MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 90b83f9b54a431d5cd69ad1408ef2b46f5072cb1a7c1a8e69d9ae524d68abe97. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 1 File information Comments 1

SHA256 hash: 90b83f9b54a431d5cd69ad1408ef2b46f5072cb1a7c1a8e69d9ae524d68abe97
SHA3-384 hash: d12d65f0430e7238ce5d582ff51941f628d65f867d2298c44a59b94443d62e63eb1b21367b59df28ebd218fe4549d56e
SHA1 hash: 293abe19e794d1fbef6dde969756962cd05283f3
MD5 hash: edd9e7be9dd96cf6564ef42bb221b180
humanhash: neptune-nebraska-five-princess
File name:edd9e7be9dd96cf6564ef42bb221b180
Download: download sample
Signature RedLineStealer
File size:477'696 bytes
First seen:2022-01-29 00:27:08 UTC
Last seen:2022-01-29 02:46:00 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f4ab55e39b7ba028d951c95017403578 (1 x Smoke Loader, 1 x RedLineStealer)
ssdeep 12288:4Bif2FOiKFWBg4ppyyBH2/Rl9wMRzQc8Wo:4NuFWBhp8uWhwMRU3h
Threatray 4'181 similar samples on MalwareBazaar
TLSH T16CA4BF10B7A1C035F1B712F446BA93A9A53E7AE25B2460CF53D526EE87356E0EC3131B
File icon (PE):PE icon
dhash icon 25ec1370399b9b91 (21 x Smoke Loader, 18 x RedLineStealer, 10 x Amadey)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
325
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
edd9e7be9dd96cf6564ef42bb221b180
Verdict:
Malicious activity
Analysis date:
2022-01-29 00:32:40 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Launching the default Windows debugger (dwwin.exe)
Sending a TCP request to an infection source
Stealing user critical data
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed redline
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Raccrypt
Status:
Malicious
First seen:
2022-01-28 06:44:00 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:sewpalpadin discovery infostealer spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.29:20819
Unpacked files
SH256 hash:
e202c11d527f5d89f97dded104fd276a484b40ae19ab5af32c0539fcefa0d4f5
MD5 hash:
72b793292146793718feee9519111164
SHA1 hash:
ee14d4b283eb63ad305182c5ebbe06bffbf77b21
SH256 hash:
383aa754dae128cfafcc6bde1f4f4ea35cde6aca5fb5ca9dc458f66a734a1cc6
MD5 hash:
57b45c7f8796ff6ac4e53f3598f0a7d7
SHA1 hash:
cfedfcfc31929cb37d24f38ec3956727f7fd09d5
SH256 hash:
859ebd7a7e8f8f3f45d94416074fd24b20933c8537f5ebc5e451f89096c41f9e
MD5 hash:
b0bde6717c5ca23c517fc392bd550af5
SHA1 hash:
8da77b12caabd1ad230d2ede9413e52e616e975b
SH256 hash:
90b83f9b54a431d5cd69ad1408ef2b46f5072cb1a7c1a8e69d9ae524d68abe97
MD5 hash:
edd9e7be9dd96cf6564ef42bb221b180
SHA1 hash:
293abe19e794d1fbef6dde969756962cd05283f3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 90b83f9b54a431d5cd69ad1408ef2b46f5072cb1a7c1a8e69d9ae524d68abe97

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-01-29 00:27:09 UTC

url : hxxp://5.255.100.31/imagehosting/uploads/sefile.exe