MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9fbdcf044aba61ae6c0678b5f83fc4bd8b589ba3a4fd12a5bef53e2ead494eed. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 6


Intelligence 6 IOCs YARA 6 File information Comments

SHA256 hash: 9fbdcf044aba61ae6c0678b5f83fc4bd8b589ba3a4fd12a5bef53e2ead494eed
SHA3-384 hash: b40bc8ebbd43f606dd26ac4977d0d5951fe907525fbe090b525d10121d11454290b66a0f9a4e21a1c9828d0af1fc208b
SHA1 hash: 93da03b3005a88b4298149c91f5f721478fb54e5
MD5 hash: 90440985e96dd8aaa439fa7dedba2499
humanhash: summer-bluebird-angel-burger
File name:90440985e96dd8aaa439fa7dedba2499.exe
Download: download sample
Signature RedLineStealer
File size:2'969'600 bytes
First seen:2021-07-08 16:14:38 UTC
Last seen:2021-07-08 16:50:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'647 x AgentTesla, 19'452 x Formbook, 12'201 x SnakeKeylogger)
ssdeep 49152:DXU3uNePkzBT2cGQtFCx+wVhucTcDOpaNFCvtvQJqIZQ/hAH:DAuNeJPjLoHCwy/hAH
Threatray 5 similar samples on MalwareBazaar
TLSH T164D558027E04CE52F08C223BD6DE410847B4E8596BE2F7277DEA336E54563A63D0D9DA
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
90440985e96dd8aaa439fa7dedba2499.exe
Verdict:
Malicious activity
Analysis date:
2021-07-08 16:16:15 UTC
Tags:
loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw
Score:
64 / 100
Signature
Drops PE files to the document folder of the user
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 446046 Sample: gX1uMW7bed.exe Startdate: 08/07/2021 Architecture: WINDOWS Score: 64 66 www.youtube.com 2->66 68 consent.youtube.com 2->68 84 Multi AV Scanner detection for submitted file 2->84 86 Machine Learning detection for sample 2->86 11 gX1uMW7bed.exe 14 5 2->11         started        16 ClientHost.exe 1 2->16         started        18 ClientHost.exe 2->18         started        20 ClientHost.exe 2->20         started        signatures3 process4 dnsIp5 78 176.111.174.107, 49724, 49728, 49821 WILWAWPL Russian Federation 11->78 58 C:\Users\user\Documents\ClientHost_new.exe, PE32 11->58 dropped 60 C:\Users\user\AppData\...\gX1uMW7bed.exe.log, ASCII 11->60 dropped 94 Drops PE files to the document folder of the user 11->94 22 ClientHost_new.exe 5 11->22         started        file6 signatures7 process8 file9 54 C:\Users\user\Documents\ClientHost.exe, PE32 22->54 dropped 88 Drops PE files to the document folder of the user 22->88 26 ClientHost.exe 14 5 22->26         started        signatures10 process11 dnsIp12 76 192.162.247.237, 1377, 49766, 49769 DATACHEAP-LLC-ASRU Russian Federation 26->76 56 C:\Users\user\Documents\chromedriver.exe, PE32 26->56 dropped 90 Drops PE files to the document folder of the user 26->90 92 Uses schtasks.exe or at.exe to add and modify task schedules 26->92 31 chromedriver.exe 2 26->31         started        36 chromedriver.exe 1 26->36         started        38 schtasks.exe 1 26->38         started        file13 signatures14 process15 dnsIp16 80 127.0.0.1 unknown unknown 31->80 52 C:\Users\user\AppData\Local\...\Preferences, ASCII 31->52 dropped 82 Tries to harvest and steal browser information (history, passwords, etc) 31->82 40 chrome.exe 31->40         started        43 conhost.exe 31->43         started        45 conhost.exe 36->45         started        47 conhost.exe 38->47         started        file17 signatures18 process19 dnsIp20 70 192.168.2.1 unknown unknown 40->70 72 192.168.2.3 unknown unknown 40->72 74 239.255.255.250 unknown Reserved 40->74 49 chrome.exe 40->49         started        process21 dnsIp22 62 www.youtube.com 49->62 64 consent.youtube.com 49->64
Threat name:
Win32.Trojan.Wacatac
Status:
Malicious
First seen:
2021-07-08 16:02:50 UTC
AV detection:
13 of 29 (44.83%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware stealer
Behaviour
Creates scheduled task(s)
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Reads user/profile data of web browsers
Executes dropped EXE
Unpacked files
SH256 hash:
9fbdcf044aba61ae6c0678b5f83fc4bd8b589ba3a4fd12a5bef53e2ead494eed
MD5 hash:
90440985e96dd8aaa439fa7dedba2499
SHA1 hash:
93da03b3005a88b4298149c91f5f721478fb54e5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Glasses
Author:Seth Hardy
Description:Glasses family
Rule name:GlassesCode
Author:Seth Hardy
Description:Glasses code features
Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 9fbdcf044aba61ae6c0678b5f83fc4bd8b589ba3a4fd12a5bef53e2ead494eed

(this sample)

  
Delivery method
Distributed via web download

Comments