MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c
SHA3-384 hash: c61ba4e921a7687e46daa712b1936330c7ea9919ab32ed22700260401f8166be63efa3de3b7fe3a00bc0e08891413384
SHA1 hash: 0d3eca4ef5534bc114934c34457b2760673d851b
MD5 hash: 0d65458e0d2fba405d9eddf3c5f474c0
humanhash: bluebird-salami-march-hamper
File name:0d65458e0d2fba405d9eddf3c5f474c0.exe
Download: download sample
Signature RedLineStealer
File size:550'680 bytes
First seen:2022-02-03 13:54:13 UTC
Last seen:2022-03-22 19:19:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash dd74c9919503d6f89c3c73a9f1208fee (1 x RedLineStealer)
ssdeep 12288:OYDD6XvmNjw7sCX2u4ZZHXynPilyEpEuWHE:O2D6fmNjw7t4yZE
Threatray 201 similar samples on MalwareBazaar
TLSH T172C41281BB15D045CAAA523ECAD39AF27253FDB7FCC5A9D72080BF4A30735D05A07986
File icon (PE):PE icon
dhash icon cfcfc3e19999e1e3 (1 x RedLineStealer, 1 x CoinMiner)
Reporter abuse_ch
Tags:exe RedLineStealer signed

Code Signing Certificate

Organisation:Kingston Fury Beast DDR4 2x16Gb CK432C16BBK2/32
Issuer:Kingston Fury Beast DDR4 2x16Gb CK432C16BBK2/32
Algorithm:sha1WithRSAEncryption
Valid from:2022-02-02T10:19:50Z
Valid to:2032-02-03T10:19:50Z
Serial number: 1b473c042ca767a741cf0b6cc20e7ad9
Thumbprint Algorithm:SHA256
Thumbprint: 8894a817a58e016adc6c51dcc05f8a181d5f89497495e410a5423f51259479a6
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
2
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Searching for analyzing tools
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
overlay packed shell32.dll
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-02-03 13:55:09 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:guloader family:redline discovery downloader infostealer persistence spyware stealer suricata
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Sets service image path in registry
Guloader,Cloudeye
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Unpacked files
SH256 hash:
0cc1d9483db4905c2616d16026f90be178dfed0eabbeb06762ab11c66f0fe785
MD5 hash:
dc4bc800c1209fc0b70056dfdc31a41f
SHA1 hash:
c4bdd0e1e05d352bff0eba13f6f1acbb4b2a0fde
SH256 hash:
a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c
MD5 hash:
0d65458e0d2fba405d9eddf3c5f474c0
SHA1 hash:
0d3eca4ef5534bc114934c34457b2760673d851b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c

(this sample)

  
Delivery method
Distributed via web download

Comments