MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 91a63868ca56bae97b954c0ece75ed4f66e18bf2c258a9ed5712e376bae7220c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 10
| SHA256 hash: | 91a63868ca56bae97b954c0ece75ed4f66e18bf2c258a9ed5712e376bae7220c |
|---|---|
| SHA3-384 hash: | 0742cf9873a30297a4b7127d518605081acade86c7fa4033da7fc297644f98fa6d3585ffdfae4b8b6b07785cf3454d4d |
| SHA1 hash: | 97f9ed4054e47f32e1ef538e21b4ce4969a15066 |
| MD5 hash: | 9ed9f7afabfb805380dbcb5e96f2e0e4 |
| humanhash: | oscar-quebec-cardinal-oklahoma |
| File name: | OhGodAnETHlargementPill.sfx.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 2'133'914 bytes |
| First seen: | 2021-01-01 20:12:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat) |
| ssdeep | 24576:5HLmCiIhiXLd6xl0bbdK+5jcG9y+6HK6GrDEm/ZjXarW/w5QLTOFEhY+hlMoJluI:q+0bH9cAybGD3jX6WAaR7gSPvDBoM |
| Threatray | 893 similar samples on MalwareBazaar |
| TLSH | 68A52341B9C499B3C4724936292D8FA0793DBC200F34CBEF63F8691D9A755D16A34BA3 |
| Reporter | |
| Tags: | RedLineStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
347
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
OhGodAnETHlargementPill.sfx.exe
Verdict:
Malicious activity
Analysis date:
2021-01-01 20:13:55 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Deleting a recently created file
Creating a file in the Program Files subdirectories
Moving a file to the Program Files subdirectory
Creating a file
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a custom TCP request
Creating a process with a hidden window
Sending an HTTP GET request
Launching a process
Sending an HTTP POST request
Sending a UDP request
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% subdirectories
Reading critical registry keys
Running batch commands
Stealing user critical data
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Quasar RedLine
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Contains functionality to disable the Task Manager (.Net Source)
Deletes shadow drive data (may be related to ransomware)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious Csc.exe Source File Folder
Sigma detected: Suspicious Svchost Process
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected Quasar RAT
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.Quasar
Status:
Malicious
First seen:
2021-01-01 20:13:04 UTC
AV detection:
9 of 28 (32.14%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 883 additional samples on MalwareBazaar
Result
Malware family:
redline
Score:
10/10
Tags:
family:agenttesla family:redline infostealer keylogger spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Runs ping.exe
Suspicious use of SetWindowsHookEx
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Suspicious use of SetThreadContext
JavaScript code in executable
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Drops startup file
Executes dropped EXE
AgentTesla Payload
ServiceHost packer
AgentTesla
RedLine
Unpacked files
SH256 hash:
91a63868ca56bae97b954c0ece75ed4f66e18bf2c258a9ed5712e376bae7220c
MD5 hash:
9ed9f7afabfb805380dbcb5e96f2e0e4
SHA1 hash:
97f9ed4054e47f32e1ef538e21b4ce4969a15066
SH256 hash:
d3e396da40670b10d069728d526ce0a0883e5f1516174e22b1f87bea5f5edf11
MD5 hash:
8ef203b369247f13f55c105516132fcc
SHA1 hash:
0f123a34d4f256c06fa4029fea7e5534346cfd24
SH256 hash:
3bab262d2a76924ca13c110b3740d90bde7bd267ee6eb39774446839799a75b3
MD5 hash:
7ecf53e0d4dae718b32709a201122be6
SHA1 hash:
042ac26ed21ceb4bc74b7b61823456a070368200
SH256 hash:
2737448db2e556b90994587ab9a8284147e04de9ed6155db3f097d111b1647fe
MD5 hash:
21977db1f43d6f59442967326f57ee0f
SHA1 hash:
445676a59df254be303d14bc2521bf56811b90d4
SH256 hash:
0fd10b75d8f7fbbf4964ae5adcf350c38b1bcf64b59ec14a72ea1ceb9022f82c
MD5 hash:
f62ba0d008d4ff776b5ca6190a25783a
SHA1 hash:
ed4678ae80e1d1fea2aca31097c5daee49996cfc
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.