MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 96c8b3ebbf0c015414e7a27a128dce9a4e4fc7c926904884fd16036c9afdd413. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 96c8b3ebbf0c015414e7a27a128dce9a4e4fc7c926904884fd16036c9afdd413
SHA3-384 hash: 63c80ec5e93484929318dcfe873bf76fc8088f4d2628c0952b650a7382484bce88274825689f701bc1ae9d0ffaa8afc8
SHA1 hash: 43d841b0d7df7f062c4386c3a42cf2cfaf5ad5f7
MD5 hash: deeac0d13bbbcfe4612ed896f95b1344
humanhash: timing-timing-lake-ceiling
File name:deeac0d13bbbcfe4612ed896f95b1344.exe
Download: download sample
Signature RedLineStealer
File size:459'776 bytes
First seen:2021-10-27 14:40:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f326f88ca83c9aacaa44acfb8884f1d4 (8 x RedLineStealer, 4 x DCRat, 2 x CoinMiner)
ssdeep 12288:a5oaqjp/9TRvqB0IryItQ7VKd2OXN+KH/TSnwu28NKjxm1:a5v4DTRCQsgOXNf/duHN7
Threatray 80 similar samples on MalwareBazaar
TLSH T1A0A4F152B1E01189EBB581FBE8425B46E67170720721A3DB2B7813B71F5B9CA8F7C394
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Password_is_5432764372___BitlyWindows10t.rar
Verdict:
Malicious activity
Analysis date:
2021-10-27 13:41:16 UTC
Tags:
trojan autoit evasion rat azorult redline opendir stealer vidar formbook raccoon fareit pony loader smoke

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process from a recently created file
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the Windows subdirectories
Deleting a recently created file
Replacing files
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
48 / 100
Signature
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Uses BatToExe to download additional code
Yara detected BatToExe compiled binary
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 510258 Sample: Hl9GJ6GvUS.exe Startdate: 27/10/2021 Architecture: WINDOWS Score: 48 31 Antivirus detection for dropped file 2->31 33 Yara detected BatToExe compiled binary 2->33 7 Hl9GJ6GvUS.exe 9 2->7         started        process3 file4 25 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 7->25 dropped 27 C:\Users\user\AppData\Local\Temp\...\9014.bat, ASCII 7->27 dropped 10 cmd.exe 1 3 7->10         started        13 conhost.exe 7->13         started        process5 signatures6 35 Uses BatToExe to download additional code 10->35 15 extd.exe 1 10->15         started        18 extd.exe 2 10->18         started        21 extd.exe 2 10->21         started        23 extd.exe 1 10->23         started        process7 dnsIp8 37 Multi AV Scanner detection for dropped file 15->37 29 cdn.discordapp.com 162.159.134.233, 443, 49752, 49753 CLOUDFLARENETUS United States 21->29 signatures9
Threat name:
Win64.Trojan.Phonzy
Status:
Malicious
First seen:
2021-10-27 14:40:33 UTC
AV detection:
11 of 28 (39.29%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer upx
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
Unpacked files
SH256 hash:
96c8b3ebbf0c015414e7a27a128dce9a4e4fc7c926904884fd16036c9afdd413
MD5 hash:
deeac0d13bbbcfe4612ed896f95b1344
SHA1 hash:
43d841b0d7df7f062c4386c3a42cf2cfaf5ad5f7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments