MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9a8a699900f94843189af50d9aa633419301f768a156031751278fa079add7a5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA File information Comments

SHA256 hash: 9a8a699900f94843189af50d9aa633419301f768a156031751278fa079add7a5
SHA3-384 hash: d4f73126103018e4f820a705421104543faf274f7957b96f2ad0e5a23c92b0ea9784b95a34f465a56ec4877615ad5679
SHA1 hash: ee4d9b77b17a332969ae239ceaf8dd4b9dc30b2e
MD5 hash: cb75c5bda505a48e4c4b17d07774b5e2
humanhash: batman-don-video-zulu
File name:PO specification dt.22-11-21.png.exe
Download: download sample
Signature RedLineStealer
File size:496'261 bytes
First seen:2021-11-22 00:01:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3eaa732d4dae53340f9646bdd85dac41 (11 x NetSupport, 6 x RedLineStealer, 4 x ISRStealer)
ssdeep 12288:cw35dS4X8AnVqQLMWR4UWL0KvxEFhkgaR6zSyu8u/1:N35dPpLLLYLJvWFhkxRws1
Threatray 1'037 similar samples on MalwareBazaar
TLSH T186B4F1A1B9D1D8B0E93300306DBED7307D3ABC3A96B0548BBBD4367C5A72992D616713
File icon (PE):PE icon
dhash icon c3c74d4d05233d3c (2 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
3.134.125.175:10655

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
3.134.125.175:10655 https://threatfox.abuse.ch/ioc/251888/

Intelligence


File Origin
# of uploads :
1
# of downloads :
138
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO specification dt.22-11-21.png.exe
Verdict:
Malicious activity
Analysis date:
2021-11-22 00:03:24 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Gathering data
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Launching a process
Sending a custom TCP request
Launching a service
Creating a file
Changing a file
Delayed writing of the file
Creating a process from a recently created file
DNS request
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Cobalt Strike
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad.spyw
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.SpyAgent
Status:
Malicious
First seen:
2021-11-22 00:02:06 UTC
AV detection:
18 of 27 (66.67%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:cheat discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
0.tcp.ngrok.io:10655
Unpacked files
SH256 hash:
2d1221a1eddd46ad4eafce03f8215eea1453030acb8c45c737b74b91fb9403e0
MD5 hash:
b10cedd1dda0ca983ff40246190e807c
SHA1 hash:
d7a8ac04346b94f27e3b799416e53267de429807
SH256 hash:
4cfdd9f05cfce63e22f45d2baa525edd1110fe89bc4b4352b38528bdc5137eee
MD5 hash:
897fd68dc54d51e4fe824182250c7f3c
SHA1 hash:
01bb729b4fdd7b92d309b02e0fe6d226a65bc386
SH256 hash:
9a8a699900f94843189af50d9aa633419301f768a156031751278fa079add7a5
MD5 hash:
cb75c5bda505a48e4c4b17d07774b5e2
SHA1 hash:
ee4d9b77b17a332969ae239ceaf8dd4b9dc30b2e
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments