MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a406b6a41cad101dcebcb5b5e983b82d39e4f24b5eb622fc1cc87eb6f167a0fc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 2 File information Comments

SHA256 hash: a406b6a41cad101dcebcb5b5e983b82d39e4f24b5eb622fc1cc87eb6f167a0fc
SHA3-384 hash: 6a067dc52ea171f74307cc42a5747d81ad23e6a09d5fd7360fd00e85a74f89bdd8c127e6e8dcc8d1e871a474192c4318
SHA1 hash: 67a2d678ca35cdf5152152dac71ddf395859a5f2
MD5 hash: 0150ca8a36644fef94492de408fbee8f
humanhash: aspen-mississippi-gee-summer
File name:0150ca8a36644fef94492de408fbee8f.exe
Download: download sample
Signature RedLineStealer
File size:1'153'536 bytes
First seen:2023-03-02 07:25:24 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:ryYDZkQKvvlv6OY/z40KlifxqFjtGI9jvmCeEYH8e:eY9nK3lvK/DKloYGI5vLe
Threatray 3'855 similar samples on MalwareBazaar
TLSH T19D35230BE6ECC076E9B56BF01CF103930675B8606974879627DA9D5D08B37B8AB35323
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.56.146.11:4162

Intelligence


File Origin
# of uploads :
1
# of downloads :
212
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
0150ca8a36644fef94492de408fbee8f.exe
Verdict:
Malicious activity
Analysis date:
2023-03-02 07:28:16 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Launching a service
Creating a file
Connecting to a non-recommended domain
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Blocking the Windows Defender launch
Disabling the operating system update service
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
80%
Tags:
advpack.dll CAB installer packed redline rundll32.exe setupapi.dll shell32.dll stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 818333 Sample: xpHJnxKRde.exe Startdate: 02/03/2023 Architecture: WINDOWS Score: 100 67 Snort IDS alert for network traffic 2->67 69 Malicious sample detected (through community Yara rule) 2->69 71 Antivirus detection for dropped file 2->71 73 8 other signatures 2->73 10 xpHJnxKRde.exe 1 4 2->10         started        13 rundll32.exe 2->13         started        15 rundll32.exe 2->15         started        17 3 other processes 2->17 process3 file4 49 C:\Users\user\AppData\...\plqT35rg74.exe, PE32 10->49 dropped 51 C:\Users\user\AppData\...\griG25Mv83.exe, PE32 10->51 dropped 19 plqT35rg74.exe 1 4 10->19         started        process5 file6 41 C:\Users\user\AppData\...\plID14Mb51.exe, PE32 19->41 dropped 43 C:\Users\user\AppData\...\fuOv6491ty10.exe, PE32 19->43 dropped 75 Multi AV Scanner detection for dropped file 19->75 77 Machine Learning detection for dropped file 19->77 23 plID14Mb51.exe 1 4 19->23         started        signatures7 process8 file9 45 C:\Users\user\AppData\...\pliV83vF90.exe, PE32 23->45 dropped 47 C:\Users\user\AppData\...\eszp17sd78.exe, PE32 23->47 dropped 93 Multi AV Scanner detection for dropped file 23->93 95 Machine Learning detection for dropped file 23->95 27 pliV83vF90.exe 1 4 23->27         started        signatures10 process11 file12 53 C:\Users\user\AppData\...\plIo86ku62.exe, PE32 27->53 dropped 55 C:\Users\user\AppData\...\diNw61By29.exe, PE32 27->55 dropped 97 Multi AV Scanner detection for dropped file 27->97 99 Machine Learning detection for dropped file 27->99 31 plIo86ku62.exe 1 4 27->31         started        signatures13 process14 file15 57 C:\Users\user\AppData\...\caWc29Dm89.exe, PE32 31->57 dropped 59 C:\Users\user\AppData\...\buLU97CU85.exe, PE32 31->59 dropped 63 Multi AV Scanner detection for dropped file 31->63 65 Machine Learning detection for dropped file 31->65 35 caWc29Dm89.exe 5 31->35         started        39 buLU97CU85.exe 9 1 31->39         started        signatures16 process17 dnsIp18 61 193.56.146.11, 4162, 49683 LVLT-10753US unknown 35->61 79 Multi AV Scanner detection for dropped file 35->79 81 Detected unpacking (changes PE section rights) 35->81 83 Detected unpacking (overwrites its own PE header) 35->83 91 4 other signatures 35->91 85 Machine Learning detection for dropped file 39->85 87 Disable Windows Defender notifications (registry) 39->87 89 Disable Windows Defender real time protection (registry) 39->89 signatures19
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2023-03-02 03:29:13 UTC
File Type:
PE (Exe)
Extracted files:
256
AV detection:
21 of 25 (84.00%)
Threat level:
  2/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:durov botnet:rouch discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
Malware Config
C2 Extraction:
193.56.146.11:4162
Unpacked files
SH256 hash:
6cf67d2968b38cbcbe6022d1a3940fd80c88a129a8bf28c6f37e4a2f6939e497
MD5 hash:
7ec79075b6f5a617f20bfcec31948573
SHA1 hash:
b84c47b996833a941e156a63cfe1cdff877b548a
Detections:
redline
Parent samples :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 hash:
7ac6c9770fecbc0095676215b38a5229f5959c691e651ff0c51c9a4c298bc366
MD5 hash:
4e2607b793ca08bec5ba5a82f7a1d7ca
SHA1 hash:
b827bb58e4d31c65c22f3aac272abc4e39432f9d
SH256 hash:
6d6c3a20f770a73dd9bf251823364c51793fdbf8c2fbfef722fd250f8b377c44
MD5 hash:
bcd5f3847f2ea91432e5dfc3bf7afa07
SHA1 hash:
25930633432a8fe40abf81cc268c4ac3cf48a3a9
Detections:
redline
Parent samples :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 hash:
ff6d5eb20b2ba6b8bbaad9387f4547d7bffab28aa39d4d099ca1542bc9ddebdc
MD5 hash:
ccbfe326dde34ad26586b499015af988
SHA1 hash:
cb734cfdffbe0b3e563ea12cf9a4cdcae96c87f8
SH256 hash:
e5b01b47e2a96a61fd4dbc4855f737a46037b93b4dc2e606f76000ad514151d4
MD5 hash:
59579ae278dbc19c2152333bf0efb128
SHA1 hash:
f1ee0d839359253b29bbe8e7d5e6efdcb5dca2a5
SH256 hash:
a406b6a41cad101dcebcb5b5e983b82d39e4f24b5eb622fc1cc87eb6f167a0fc
MD5 hash:
0150ca8a36644fef94492de408fbee8f
SHA1 hash:
67a2d678ca35cdf5152152dac71ddf395859a5f2
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe a406b6a41cad101dcebcb5b5e983b82d39e4f24b5eb622fc1cc87eb6f167a0fc

(this sample)

  
Delivery method
Distributed via web download

Comments