MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 979489468d527202ce55a465799013a16fccfcc838d523707a016e064a0e85a1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 3 File information Comments

SHA256 hash: 979489468d527202ce55a465799013a16fccfcc838d523707a016e064a0e85a1
SHA3-384 hash: 6968bb819a07ee7615ff82530bc746e930898ef3b843036753d3cc484eac32477e847440a82260adc194edc9bffc4ba5
SHA1 hash: 4a7f534721da2efb283db7ff3272fd6e2b1252ed
MD5 hash: f4d816b13feaab16dce9b192b5ca8e6b
humanhash: india-alabama-cold-kitten
File name:f4d816b13feaab16dce9b192b5ca8e6b.exe
Download: download sample
Signature RedLineStealer
File size:374'784 bytes
First seen:2021-10-14 06:13:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'451 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 6144:sibsh7CCXNcmOZe/xWPJvgXQu0BNuXOORc3mQjCVOk4K0j:sibsdCCXqmOZe/2JoQrNuXOORc3mCCHa
Threatray 260 similar samples on MalwareBazaar
TLSH T1CB845E243AEA5019F2B3EF758FE474DBDA2FBB632B07945D209103464B23981DD9253E
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
191
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
f4d816b13feaab16dce9b192b5ca8e6b.exe
Verdict:
Malicious activity
Analysis date:
2021-10-14 06:26:12 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large strings
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Detected Stratum mining protocol
Drops executables to the windows directory (C:\Windows) and starts them
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Xmrig
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses nslookup.exe to query domains
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 502647 Sample: hQQe6WqUOP.exe Startdate: 14/10/2021 Architecture: WINDOWS Score: 100 122 107.178.104.10, 49805, 5555 IOFLOODUS United States 2->122 124 pool.supportxmr.com 2->124 126 pool-nyc.supportxmr.com 2->126 138 Sigma detected: Xmrig 2->138 140 Malicious sample detected (through community Yara rule) 2->140 142 Multi AV Scanner detection for submitted file 2->142 146 6 other signatures 2->146 13 hQQe6WqUOP.exe 15 8 2->13         started        18 services32.exe 2->18         started        20 services1312.exe 2->20         started        signatures3 144 Detected Stratum mining protocol 122->144 process4 dnsIp5 128 141.94.188.139, 43059, 49749 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 13->128 130 komaiasowu.ru 81.177.141.85, 49752, 80 RTCOMM-ASRU Russian Federation 13->130 132 cdn.discordapp.com 162.159.133.233, 443, 49755 CLOUDFLARENETUS United States 13->132 116 C:\Users\user\AppData\Local\Temp\fl.exe, PE32 13->116 dropped 118 C:\Users\user\AppData\...\hQQe6WqUOP.exe.log, ASCII 13->118 dropped 176 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 13->176 178 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 13->178 180 Tries to harvest and steal browser information (history, passwords, etc) 13->180 182 Tries to steal Crypto Currency Wallets 13->182 22 fl.exe 3 13->22         started        26 conhost.exe 13->26         started        184 Multi AV Scanner detection for dropped file 18->184 186 Writes to foreign memory regions 18->186 188 Allocates memory in foreign processes 18->188 28 conhost.exe 18->28         started        190 Creates a thread in another existing process (thread injection) 20->190 file6 signatures7 process8 file9 104 C:\Users\user\AppData\Local\Temp\sddo.exe, PE32+ 22->104 dropped 106 C:\Users\user\AppData\Local\Temp\sadid.exe, PE32+ 22->106 dropped 108 C:\Users\user\AppData\...\sadid-monero.exe, PE32+ 22->108 dropped 152 Antivirus detection for dropped file 22->152 154 Multi AV Scanner detection for dropped file 22->154 156 Adds a directory exclusion to Windows Defender 22->156 30 cmd.exe 1 22->30         started        32 cmd.exe 1 22->32         started        34 cmd.exe 1 22->34         started        36 cmd.exe 1 22->36         started        158 Uses nslookup.exe to query domains 26->158 signatures10 process11 signatures12 39 sddo.exe 30->39         started        42 conhost.exe 30->42         started        44 sadid.exe 32->44         started        46 conhost.exe 32->46         started        48 sadid-monero.exe 34->48         started        50 conhost.exe 34->50         started        150 Adds a directory exclusion to Windows Defender 36->150 52 powershell.exe 21 36->52         started        54 conhost.exe 36->54         started        56 powershell.exe 36->56         started        process13 signatures14 160 Multi AV Scanner detection for dropped file 39->160 162 Writes to foreign memory regions 39->162 164 Allocates memory in foreign processes 39->164 58 conhost.exe 4 39->58         started        166 Creates a thread in another existing process (thread injection) 44->166 61 conhost.exe 3 44->61         started        63 conhost.exe 3 48->63         started        process15 file16 110 C:\Windows\System32\services32.exe, PE32+ 58->110 dropped 65 cmd.exe 58->65         started        68 cmd.exe 1 58->68         started        112 C:\Windows\System32\wlc32.exe, PE32+ 61->112 dropped 70 cmd.exe 61->70         started        72 cmd.exe 61->72         started        114 C:\Windows\System32\services1312.exe, PE32+ 63->114 dropped 74 cmd.exe 63->74         started        76 cmd.exe 63->76         started        process17 signatures18 134 Drops executables to the windows directory (C:\Windows) and starts them 65->134 78 services32.exe 65->78         started        81 conhost.exe 65->81         started        136 Uses schtasks.exe or at.exe to add and modify task schedules 68->136 91 2 other processes 68->91 83 wlc32.exe 70->83         started        85 conhost.exe 70->85         started        93 2 other processes 72->93 87 services1312.exe 74->87         started        89 conhost.exe 74->89         started        95 2 other processes 76->95 process19 signatures20 168 Writes to foreign memory regions 78->168 170 Allocates memory in foreign processes 78->170 172 Creates a thread in another existing process (thread injection) 78->172 97 conhost.exe 78->97         started        174 Multi AV Scanner detection for dropped file 83->174 process21 dnsIp22 120 192.168.2.1 unknown unknown 97->120 102 C:\Windows\System32\...\sihost32.exe, PE32+ 97->102 dropped 148 Drops executables to the windows directory (C:\Windows) and starts them 97->148 file23 signatures24
Threat name:
ByteCode-MSIL.Trojan.Cerbu
Status:
Malicious
First seen:
2021-10-14 02:27:13 UTC
AV detection:
13 of 45 (28.89%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:xmrig discovery infostealer miner spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
XMRig Miner Payload
RedLine
RedLine Payload
xmrig
Malware Config
C2 Extraction:
141.94.188.139:43059
Unpacked files
SH256 hash:
3ba73b081a732184468d119cebdc438c7deb148adaef2127dcca0348beedc3ea
MD5 hash:
5096ce2d9b7ec198335bd0fc21d51fbe
SHA1 hash:
8c7e0f10305b88a8e5db4b107ed376d65b2a8128
SH256 hash:
979489468d527202ce55a465799013a16fccfcc838d523707a016e064a0e85a1
MD5 hash:
f4d816b13feaab16dce9b192b5ca8e6b
SHA1 hash:
4a7f534721da2efb283db7ff3272fd6e2b1252ed
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments