MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 90c0d92b87b1c826256e581b53e55a370af4ce5fbf4533162303cfad5f4c8d37. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 18


Intelligence 18 IOCs YARA 6 File information Comments

SHA256 hash: 90c0d92b87b1c826256e581b53e55a370af4ce5fbf4533162303cfad5f4c8d37
SHA3-384 hash: b8b1ba2c2c2da75cc915789264d8869aa9af00f22be86eccaf49f284f6dc85e03247ac262dd88975099cb3a634910193
SHA1 hash: ffaad9b9445a356b6f1f2143829b6636313c7760
MD5 hash: aee763d2c5e29bbaeb19046e5ccd6d4c
humanhash: lion-stairway-pizza-venus
File name:aee763d2c5e29bbaeb19046e5ccd6d4c.exe
Download: download sample
Signature RedLineStealer
File size:869'376 bytes
First seen:2023-06-14 06:25:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 12288:UMrcy90SsxuP+RfDZMM86S++rcmMuZnzvWYgi8TVWTX/OmtbB8LuapSGcaBYPY8Q:4yZCfa++QMJgi8TVWTvbtbSLFSPYJ
Threatray 2'186 similar samples on MalwareBazaar
TLSH T12F05235696EC80B2D8B117702DBB03C31F317DA09C7897A737565A9F4C726D4C632B2A
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
83.97.73.130:19061

Intelligence


File Origin
# of uploads :
1
# of downloads :
269
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
aee763d2c5e29bbaeb19046e5ccd6d4c.exe
Verdict:
Malicious activity
Analysis date:
2023-06-14 06:27:56 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Sending a TCP request to an infection source
Stealing user critical data
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
89%
Tags:
advpack.dll anti-vm CAB greyware installer lolbin packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 887182 Sample: kWzPjUM8Uq.exe Startdate: 14/06/2023 Architecture: WINDOWS Score: 100 71 Snort IDS alert for network traffic 2->71 73 Multi AV Scanner detection for domain / URL 2->73 75 Found malware configuration 2->75 77 13 other signatures 2->77 10 kWzPjUM8Uq.exe 1 4 2->10         started        13 rundll32.exe 2->13         started        15 rundll32.exe 2->15         started        17 2 other processes 2->17 process3 file4 49 C:\Users\user\AppData\Local\...\z0864066.exe, PE32 10->49 dropped 51 C:\Users\user\AppData\Local\...\t6124492.exe, PE32 10->51 dropped 19 z0864066.exe 1 4 10->19         started        process5 file6 41 C:\Users\user\AppData\Local\...\z2936419.exe, PE32 19->41 dropped 43 C:\Users\user\AppData\Local\...\s0028254.exe, PE32 19->43 dropped 79 Antivirus detection for dropped file 19->79 81 Multi AV Scanner detection for dropped file 19->81 83 Machine Learning detection for dropped file 19->83 23 z2936419.exe 1 4 19->23         started        signatures7 process8 file9 45 C:\Users\user\AppData\Local\...\z6447279.exe, PE32 23->45 dropped 47 C:\Users\user\AppData\Local\...\r2956046.exe, PE32 23->47 dropped 85 Antivirus detection for dropped file 23->85 87 Machine Learning detection for dropped file 23->87 27 z6447279.exe 1 4 23->27         started        signatures10 process11 file12 53 C:\Users\user\AppData\Local\...\p7588964.exe, PE32 27->53 dropped 55 C:\Users\user\AppData\Local\...\o6829374.exe, PE32 27->55 dropped 89 Machine Learning detection for dropped file 27->89 31 o6829374.exe 5 27->31         started        35 p7588964.exe 9 1 27->35         started        signatures13 process14 dnsIp15 57 83.97.73.130, 19061, 49699 UNACS-AS-BG8000BurgasBG Germany 31->57 59 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->59 61 Machine Learning detection for dropped file 31->61 63 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 31->63 65 Tries to harvest and steal browser information (history, passwords, etc) 31->65 37 conhost.exe 31->37         started        67 Disable Windows Defender notifications (registry) 35->67 69 Disable Windows Defender real time protection (registry) 35->69 39 conhost.exe 35->39         started        signatures16 process17
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2023-06-14 06:26:05 UTC
File Type:
PE (Exe)
Extracted files:
152
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:amadey family:redline botnet:lupa botnet:rovno discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Amadey
Modifies Windows Defender Real-time Protection settings
RedLine
Malware Config
C2 Extraction:
83.97.73.130:19061
95.214.27.98/cronus/index.php
Unpacked files
SH256 hash:
d3317e8736aa8dbab715ed4825a1b374910913434b8e905858d63d2a54c35820
MD5 hash:
ab642789406f11bf1c6dd5f209bb0c3b
SHA1 hash:
bfc2e9013e0674222055dc3b8a88f8cf208c92ae
Detections:
redline
Parent samples :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 hash:
7b701357fa3346508f7d4633b22db9216eac980aed923da72e3d54d3ad5c1369
MD5 hash:
4b8e73ac31addc3699a6db8c7d074e32
SHA1 hash:
6dd14cad1ce448c822760d14ff54d1097f32bbbb
SH256 hash:
da9ed48a9f1cbb8d338f6617d018aa2a70d56be68425949001c0945ed3446eee
MD5 hash:
631d5c959b96910fe44c5a957bc038a8
SHA1 hash:
7b596b69fbf450ddd8a9fc6f85174bfc60cdd008
Detections:
redline
SH256 hash:
2f51760a3d7484c0e23ae69a95288a3921c7088df096d7eb0a59e95561f5b070
MD5 hash:
77ae6aad9d51bb2eeb85a45654582567
SHA1 hash:
19f92ecdcc0a20c21f9893187ea270ecffe76d7e
SH256 hash:
90d387e83eea55f2c1f27edb74893b1a254de3c2b049a3b463532a7fdf74a80a
MD5 hash:
7eb447d4c90e6c9817e47c92f49b7833
SHA1 hash:
a8bf4a9293f0752371115ef48d9397729b6fa5f6
Detections:
Amadey
SH256 hash:
90c0d92b87b1c826256e581b53e55a370af4ce5fbf4533162303cfad5f4c8d37
MD5 hash:
aee763d2c5e29bbaeb19046e5ccd6d4c
SHA1 hash:
ffaad9b9445a356b6f1f2143829b6636313c7760
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 90c0d92b87b1c826256e581b53e55a370af4ce5fbf4533162303cfad5f4c8d37

(this sample)

  
Delivery method
Distributed via web download

Comments