MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 979633ef5386a4386d862a8643210676ec89394021b2513a69e5588ff5b49453. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 979633ef5386a4386d862a8643210676ec89394021b2513a69e5588ff5b49453
SHA3-384 hash: 3e367e6e72e7c31647f36685641a2338a9c680f4162dcecb68dd83252d7699e60ce9202e9a8967d9ba921d7caee4bcce
SHA1 hash: 72cb44ae26858e01e983f5805831aed90c613f0e
MD5 hash: bbbbd928e2f836778602dfe4f058089e
humanhash: mountain-golf-two-texas
File name:Wayfarer_v1.2.8.exe
Download: download sample
Signature RedLineStealer
File size:4'365'824 bytes
First seen:2022-11-13 18:04:51 UTC
Last seen:2022-11-13 19:48:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4ddf84c72581c0b846f8f339ddd2ec46 (2 x RedLineStealer)
ssdeep 98304:BOwOIMlNc8k7kfpaLWGEdKDt1Wb4MouaL62T6uDto751ij:0wOIR8k7kRgEIDiDo5+2075
Threatray 545 similar samples on MalwareBazaar
TLSH T17B1622F326160041D3E588398537FDBCB1F2EA6E4A7DEBF9B9D579C624324A4E102907
TrID 32.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
28.9% (.EXE) Win32 Executable (generic) (4505/5/1)
13.0% (.EXE) OS/2 Executable (generic) (2029/13)
12.8% (.EXE) Generic Win/DOS Executable (2002/3)
12.8% (.EXE) DOS Executable Generic (2000/1)
File icon (PE):PE icon
dhash icon b0f0cc0f8f8cc8d0 (1 x RedLineStealer, 1 x AsyncRAT)
Reporter iamdeadlyz
Tags:exe FakeSolantasy RedLineStealer SpaceDeepy Wayfarer


Avatar
Iamdeadlyz
From spacedeepy.com (impersonation of solantasy.com and oxocapital.fund)
h/t to fireflyframer
RedLineStealer C&C: 77.73.134.13:3660

Intelligence


File Origin
# of uploads :
2
# of downloads :
242
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Wayfarer_v1.2.8.exe
Verdict:
Malicious activity
Analysis date:
2022-11-13 18:07:34 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
80 / 100
Signature
Allocates memory in foreign processes
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Tedy
Status:
Malicious
First seen:
2022-11-13 18:05:14 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline infostealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
RedLine
RedLine payload
Unpacked files
SH256 hash:
5137f95dcd46e121fcfbac1214a15d463abd68dba2ae9c68d3a8f8d812713e59
MD5 hash:
ad1619c218d638a3b6176e2aa60f27cb
SHA1 hash:
c12f10f8d06bdcfc05362da1a018eb9d9d572c6f
SH256 hash:
f88ae0b4c1574508419f80aacf2822797ec2b8648b777afbd414ccc5e0d8313a
MD5 hash:
005bfbd6c74ac0b9763581894a9b5829
SHA1 hash:
ad7f99084d234b79c5b83a82c97b1f8738d4457a
SH256 hash:
979633ef5386a4386d862a8643210676ec89394021b2513a69e5588ff5b49453
MD5 hash:
bbbbd928e2f836778602dfe4f058089e
SHA1 hash:
72cb44ae26858e01e983f5805831aed90c613f0e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 979633ef5386a4386d862a8643210676ec89394021b2513a69e5588ff5b49453

(this sample)

Comments