MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9554df1b2f0b16fd50093a5910776ee26fb8546fc0d0be5a43c868037a92eef9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 9554df1b2f0b16fd50093a5910776ee26fb8546fc0d0be5a43c868037a92eef9
SHA3-384 hash: 79a2f2768168be7d68e7122fd2d39911d3a04efa72e9b1741c4b2331f5ef4b8b13369d350a2b5f67d18ed6a92a5504c6
SHA1 hash: 98dced9249f6fe0ea76a92a0d92b27dc4798d7e5
MD5 hash: 6a7b94ff928e05eb35d762b688c3552b
humanhash: skylark-speaker-blue-carbon
File name:6a7b94ff928e05eb35d762b688c3552b.exe
Download: download sample
Signature RedLineStealer
File size:3'912'184 bytes
First seen:2023-01-19 12:31:21 UTC
Last seen:2023-01-19 14:31:38 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d8e1ce6efe964fd86ad73408ea71ada5 (2 x SystemBC, 1 x RedLineStealer)
ssdeep 49152:eL8T7j96KoIeC8IJpLMD8FcPeVIns7cYM3TySzNm2SSdOew4BK83ozvsgY:28z0PIeerSQc2l3M3upkdOew6Q0V
TLSH T13C06D0C22C4FD9E6E22BA07F7364FB1582DDE90C13832AC91B719D356B41E076E914AD
TrID 42.7% (.EXE) Win32 Executable (generic) (4505/5/1)
19.2% (.EXE) OS/2 Executable (generic) (2029/13)
19.0% (.EXE) Generic Win/DOS Executable (2002/3)
18.9% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon 0cd2c1c4d0c1f20c (18 x AsyncRAT, 9 x QuasarRAT, 8 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer signed

Code Signing Certificate

Organisation:www.self-confidence.com
Issuer:www.self-confidence.com
Algorithm:sha256WithRSAEncryption
Valid from:2023-01-17T18:08:52Z
Valid to:2024-01-17T18:28:52Z
Serial number: 421e72316c1e5a8b478fe04c60cba3a7
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: ab833382fd7c1a2c31c15d1c8277ec523fdcacc937aaae15e479c8151b0dc05a
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
290
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
6a7b94ff928e05eb35d762b688c3552b.exe
Verdict:
Malicious activity
Analysis date:
2023-01-19 12:34:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Sending a custom TCP request
Creating a file
Verdict:
No Threat
Threat level:
  2/10
Confidence:
80%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine, SectopRAT
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Connects to many ports of the same IP (likely port scanning)
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Self deletion via cmd or bat file
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SectopRAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 787788 Sample: FipFQwMM9I.exe Startdate: 19/01/2023 Architecture: WINDOWS Score: 100 42 Snort IDS alert for network traffic 2->42 44 Multi AV Scanner detection for domain / URL 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 5 other signatures 2->48 7 FipFQwMM9I.exe 3 2->7         started        11 kernel32.exe 2->11         started        13 kernel32.exe 2->13         started        process3 file4 30 C:\Users\user\Baskov\kernel32.exe, PE32 7->30 dropped 32 C:\Users\...\kernel32.exe:Zone.Identifier, ASCII 7->32 dropped 50 Self deletion via cmd or bat file 7->50 15 cmd.exe 1 7->15         started        18 kernel32.exe 7->18         started        52 Writes to foreign memory regions 11->52 54 Injects a PE file into a foreign processes 11->54 20 InstallUtil.exe 15 4 11->20         started        signatures5 process6 dnsIp7 56 Uses ping.exe to check the status of other devices and networks 15->56 23 PING.EXE 1 15->23         started        26 conhost.exe 15->26         started        28 chcp.com 1 15->28         started        58 Antivirus detection for dropped file 18->58 34 5.75.149.1, 15648, 49690 HETZNER-ASDE Germany 20->34 36 eth0.me 5.132.162.27, 49691, 80 INTERNEX-ASAT Austria 20->36 60 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 20->60 62 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 20->62 64 Tries to harvest and steal browser information (history, passwords, etc) 20->64 signatures8 process9 dnsIp10 38 127.0.0.1 unknown unknown 23->38 40 192.168.2.1 unknown unknown 23->40
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2023-01-19 12:32:09 UTC
File Type:
PE (Exe)
Extracted files:
23
AV detection:
14 of 26 (53.85%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Unpacked files
SH256 hash:
9554df1b2f0b16fd50093a5910776ee26fb8546fc0d0be5a43c868037a92eef9
MD5 hash:
6a7b94ff928e05eb35d762b688c3552b
SHA1 hash:
98dced9249f6fe0ea76a92a0d92b27dc4798d7e5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments