MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a0b3e767f69fa35a2c2c280cc6ede993d6af464bb261352ea371ee9e0aa60d9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: a0b3e767f69fa35a2c2c280cc6ede993d6af464bb261352ea371ee9e0aa60d9a
SHA3-384 hash: bef275f873be3c5162f89ef92ba5b3daaf306b834d075c6241706f4e72e00274f3cc2788ad645c4ecfb5e97fd0d92d4c
SHA1 hash: 430d29c3247d754e836a773d0071a5fea704888f
MD5 hash: 9a96b1503575c3f7197c63cfe218af98
humanhash: alaska-lake-romeo-network
File name:SenseHack.exe
Download: download sample
Signature RedLineStealer
File size:1'400'832 bytes
First seen:2021-11-13 18:16:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 15aeac4aa1d11f9ad3fc4c4ac7bb9468 (58 x RedLineStealer, 5 x RaccoonStealer, 3 x CoinMiner)
ssdeep 24576:Rb9sPDn6y4rIrAJl9v7wgFI8//l0nlsqJHOaxjwuuBFOGzXqDUkEaHNYK3KLMyy:RhoDn6FsrAJb8d8/Onlt17uvOSdNaI0
Threatray 218 similar samples on MalwareBazaar
TLSH T17A553340C2DDEECAE76D247978189E0FB0AB8BF1CE5475943649F0A4869C073B19E4BD
Reporter tech_skeech
Tags:CoinMiner exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
136
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
BitCoin Miner RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Creates a thread in another existing process (thread injection)
Detected VMProtect packer
Drops PE files to the user root directory
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 521054 Sample: SenseHack.exe Startdate: 13/11/2021 Architecture: WINDOWS Score: 100 64 Found malware configuration 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 Yara detected BitCoin Miner 2->68 70 4 other signatures 2->70 11 SenseHack.exe 2->11         started        14 services32.exe 2->14         started        process3 signatures4 98 Query firmware table information (likely to detect VMs) 11->98 100 Tries to detect sandboxes and other dynamic analysis tools (window names) 11->100 102 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 11->102 110 2 other signatures 11->110 16 AppLaunch.exe 15 7 11->16         started        21 WerFault.exe 23 9 11->21         started        104 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 14->104 106 Writes to foreign memory regions 14->106 108 Allocates memory in foreign processes 14->108 112 2 other signatures 14->112 23 conhost.exe 5 14->23         started        process5 dnsIp6 60 185.215.113.83, 49744, 60722 WHOLESALECONNECTIONSNL Portugal 16->60 62 cdn.discordapp.com 162.159.133.233, 443, 49749 CLOUDFLARENETUS United States 16->62 52 C:\Users\user\AppData\Local\Temp\build.exe, PE32+ 16->52 dropped 72 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 16->72 74 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 16->74 76 Tries to harvest and steal browser information (history, passwords, etc) 16->76 25 build.exe 16->25         started        54 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 21->54 dropped 56 C:\Users\user\AppData\...\sihost32.exe, PE32+ 23->56 dropped 28 sihost32.exe 23->28         started        file7 signatures8 process9 signatures10 80 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 25->80 82 Writes to foreign memory regions 25->82 84 Allocates memory in foreign processes 25->84 86 Tries to detect virtualization through RDTSC time measurements 25->86 30 conhost.exe 4 25->30         started        88 Creates a thread in another existing process (thread injection) 28->88 34 conhost.exe 2 28->34         started        process11 file12 58 C:\Users\user\services32.exe, PE32+ 30->58 dropped 114 Drops PE files to the user root directory 30->114 36 cmd.exe 1 30->36         started        38 cmd.exe 1 30->38         started        signatures13 process14 signatures15 41 services32.exe 36->41         started        44 conhost.exe 36->44         started        78 Uses schtasks.exe or at.exe to add and modify task schedules 38->78 46 conhost.exe 38->46         started        48 schtasks.exe 1 38->48         started        process16 signatures17 90 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 41->90 92 Writes to foreign memory regions 41->92 94 Allocates memory in foreign processes 41->94 96 Creates a thread in another existing process (thread injection) 41->96 50 conhost.exe 2 41->50         started        process18
Threat name:
Win32.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-11-13 02:08:28 UTC
AV detection:
25 of 28 (89.29%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@sc4lly1337 evasion infostealer trojan vmprotect
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Checks whether UAC is enabled
Checks BIOS information in registry
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
185.215.113.83:60722
Unpacked files
SH256 hash:
9918df68db1a7c48f75ac81a9229555d1582cd4fc389b84cd5ae5bfec08a8ebf
MD5 hash:
b0e7f4bf100d55c47971c428ed820d41
SHA1 hash:
a4541a5349042de514187adc8a9ed6916607c346
SH256 hash:
a0b3e767f69fa35a2c2c280cc6ede993d6af464bb261352ea371ee9e0aa60d9a
MD5 hash:
9a96b1503575c3f7197c63cfe218af98
SHA1 hash:
430d29c3247d754e836a773d0071a5fea704888f
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe a0b3e767f69fa35a2c2c280cc6ede993d6af464bb261352ea371ee9e0aa60d9a

(this sample)

  
Delivery method
Distributed via web download

Comments