MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9d9692d74b12d09a3cb95c7f42768a84cc2896634ac3a9022350db200ecbca9f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: 9d9692d74b12d09a3cb95c7f42768a84cc2896634ac3a9022350db200ecbca9f
SHA3-384 hash: ed3d65dd94cc30e8cde06cf829b4ca405eb85c6a1293de58e8ea29bb7a75f66113ba52a92233bedc75abf364942e4360
SHA1 hash: 34d3b98e7e3ac56900bc8e1c55f9a388bf71f91b
MD5 hash: 6a1b1d918c92e8e8bda350799cca7736
humanhash: high-nineteen-diet-blue
File name:Setup.exe
Download: download sample
Signature RedLineStealer
File size:224'768 bytes
First seen:2022-11-27 20:25:35 UTC
Last seen:2022-12-05 05:59:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5ccee7fe61e6200ea17bb9e915d9cb90 (2 x RedLineStealer, 1 x LaplasClipper)
ssdeep 6144:82LJAk7OkzwDv+ohvFnuqLlFRII/81Kmvp:8Sjzi+QPRIm8oC
Threatray 1'946 similar samples on MalwareBazaar
TLSH T1C124CF1376A16675E8A2D0F8EAD153B0E47E8A3E33F55042230D356AB6005F75BBE23D
TrID 39.4% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.5% (.SCR) Windows screen saver (13097/50/3)
13.3% (.EXE) Win64 Executable (generic) (10523/12/4)
8.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.3% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter tcains1
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
3
# of downloads :
240
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Setup.exe
Verdict:
Malicious activity
Analysis date:
2022-11-27 20:28:27 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a window
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed redline zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
MinerDownloader, RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Generic MinerDownloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 754767 Sample: Setup.exe Startdate: 27/11/2022 Architecture: WINDOWS Score: 100 46 Snort IDS alert for network traffic 2->46 48 Multi AV Scanner detection for domain / URL 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 5 other signatures 2->52 9 Setup.exe 1 2->9         started        process3 signatures4 62 Contains functionality to inject code into remote processes 9->62 64 Writes to foreign memory regions 9->64 66 Allocates memory in foreign processes 9->66 68 Injects a PE file into a foreign processes 9->68 12 vbc.exe 15 7 9->12         started        17 WerFault.exe 24 9 9->17         started        19 conhost.exe 9->19         started        process5 dnsIp6 42 185.215.113.69, 15544, 49705 WHOLESALECONNECTIONSNL Portugal 12->42 44 dl.uploadgram.me 176.9.247.226, 443, 49711, 49712 HETZNER-ASDE Germany 12->44 36 C:\Users\user\AppData\Local\Temp\System.exe, PE32 12->36 dropped 74 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->74 76 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->76 78 Tries to harvest and steal browser information (history, passwords, etc) 12->78 80 Tries to steal Crypto Currency Wallets 12->80 21 System.exe 14 501 12->21         started        38 C:\ProgramData\Microsoft\...\Report.wer, Unicode 17->38 dropped file7 signatures8 process9 dnsIp10 40 dl.uploadgram.me 21->40 54 Antivirus detection for dropped file 21->54 56 Multi AV Scanner detection for dropped file 21->56 58 Obfuscated command line found 21->58 60 2 other signatures 21->60 25 cmd.exe 1 21->25         started        signatures11 process12 signatures13 70 Obfuscated command line found 25->70 72 Adds a directory exclusion to Windows Defender 25->72 28 powershell.exe 21 25->28         started        30 conhost.exe 25->30         started        32 chcp.com 1 25->32         started        34 2 other processes 25->34 process14
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-11-27 20:26:08 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
30 of 41 (73.17%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:xmrig infostealer miner persistence spyware
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
XMRig Miner payload
RedLine
RedLine payload
xmrig
Malware Config
C2 Extraction:
185.215.113.69:15544
Unpacked files
SH256 hash:
9e84394afad6c0b63b6b3d653cf4e63eb307428f3fa10ffca2e601899cdc0d04
MD5 hash:
6d0ea5d1ed92472a3c6613768f82200c
SHA1 hash:
7f2ffca7752ab96d1b59ec8f03d72a57ba04bd2e
Detections:
redline
SH256 hash:
9d9692d74b12d09a3cb95c7f42768a84cc2896634ac3a9022350db200ecbca9f
MD5 hash:
6a1b1d918c92e8e8bda350799cca7736
SHA1 hash:
34d3b98e7e3ac56900bc8e1c55f9a388bf71f91b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 9d9692d74b12d09a3cb95c7f42768a84cc2896634ac3a9022350db200ecbca9f

(this sample)

  
Delivery method
Distributed via web download

Comments