MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9619a55c49642d423d9244bfe2e50b5027c395386056f82bbd10b7134b3d854e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 11
| SHA256 hash: | 9619a55c49642d423d9244bfe2e50b5027c395386056f82bbd10b7134b3d854e |
|---|---|
| SHA3-384 hash: | e8e4b98aee6a573501829af5835f4fbbcd19f4e62b0d8fc777ab06e49c413f92cc7038c920633ac792e28ae9d2ae7a88 |
| SHA1 hash: | 2820b43315c4792515bff6b6cf96e1021c711b4f |
| MD5 hash: | b888083ff853d4f150acb307906fb38d |
| humanhash: | don-arizona-paris-purple |
| File name: | b888083ff853d4f150acb307906fb38d.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 2'403'360 bytes |
| First seen: | 2022-04-15 04:56:16 UTC |
| Last seen: | 2022-04-20 10:21:48 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7af3fcc58a6937bb6482ae42b5c5baab (1 x CoinMiner, 1 x RedLineStealer) |
| ssdeep | 49152:xHoOidch7dAZgpMBDtApq1cgqwCX7sUMvvmKsxaOONQWRgNajX3L55VDeedx8QB/:xH1R7dAZgpMBDtApq1cgqwCLsUMvvmKV |
| TLSH | T177B5D033D99D92B1CC2126F1950306A76C2F99F971CFBDA2F30D1821D073A2D64A7B69 |
| TrID | 32.1% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 23.82.141.102:42921 | https://threatfox.abuse.ch/ioc/519978/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
320
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
b888083ff853d4f150acb307906fb38d.exe
Verdict:
Malicious activity
Analysis date:
2022-04-15 05:01:45 UTC
Tags:
trojan rat redline evasion loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
greyware overlay packed zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Malicious
Result
Threat name:
RedLine SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Antivirus detection for URL or domain
Benign windows process drops PE files
Binary or sample is protected by dotNetProtector
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to detect sleep reduction / modifications
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Detected unpacking (changes PE section rights)
Drops PE files to the user root directory
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Execution from Suspicious Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Suspicious Program Location with Network Connections
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to delay execution (extensive OutputDebugStringW loop)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-04-08 03:44:10 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
27 of 42 (64.29%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Unpacked files
SH256 hash:
dd96dd3fb9a841267ba7fdd9c6ee960f5c705763d34d3744299f2a74e7fa24f5
MD5 hash:
f7e0bc53f475f93c184b31409ca5539f
SHA1 hash:
e60ba555b7f4d5dc28d57b474e0e0c7554da2552
SH256 hash:
356e4e6ba72cd92750e00ca7ee0016e53eddf4674d833afff6a17dabdb62cccd
MD5 hash:
dd98a38572264302a031491ab1609399
SHA1 hash:
1289dd899d70e5d7dbc370a05d1fe7b6fd853e62
SH256 hash:
9619a55c49642d423d9244bfe2e50b5027c395386056f82bbd10b7134b3d854e
MD5 hash:
b888083ff853d4f150acb307906fb38d
SHA1 hash:
2820b43315c4792515bff6b6cf96e1021c711b4f
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.