MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 abf0a7d34d6187eea645643b45c99eeb12778ef1ad803d56caebe96b05aca52e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: abf0a7d34d6187eea645643b45c99eeb12778ef1ad803d56caebe96b05aca52e
SHA3-384 hash: caa760cd456257667fb7c6887a78950fbdfc6cfe719c5bfcf98a14e7d3f4b8b70e92bcc5f120718658699c5065ebedbc
SHA1 hash: 6f068a0b08f4deffef0c623b3ad86171f7af59f9
MD5 hash: fc8aa247e3276097e369173274da8cff
humanhash: jig-finch-helium-maine
File name:abf0a7d34d6187eea645643b45c99eeb12778ef1ad803.exe
Download: download sample
Signature RedLineStealer
File size:546'816 bytes
First seen:2022-03-16 14:16:17 UTC
Last seen:2022-03-16 15:51:54 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 390d44241890f16bc2697a53156b03cc (2 x RedLineStealer)
ssdeep 12288:xqPOldwd5r43BfyfWRbTULSK/lGRgOUqmq9kR6lhKXhB3a9FsqJKB57d8f+iX:x2Gdwd23hoWRbILSK/cRgOnmq9g6kB3G
Threatray 1'686 similar samples on MalwareBazaar
TLSH T15FC423263A8FB108F4ED5AFA5BEDED43D056315601AE8912EFC87F669024C3877406DE
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
91.243.32.19:20141

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
91.243.32.19:20141 https://threatfox.abuse.ch/ioc/395717/

Intelligence


File Origin
# of uploads :
2
# of downloads :
221
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
http://79.133.56.233/wp-blog/images/182.exe
Verdict:
Malicious activity
Analysis date:
2022-03-17 11:16:49 UTC
Tags:
loader trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Reline
Status:
Malicious
First seen:
2022-03-16 14:17:13 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
24 of 27 (88.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Program crash
Unpacked files
SH256 hash:
092bf9b6eb0b1b9dbf621283f31c05a9630cee51d25f4ba54b043cefeff813f7
MD5 hash:
0bc6dd14abacd81b34a082a2569c1284
SHA1 hash:
632b93f7bd9acd71604efd016ee0b14da5a05c49
SH256 hash:
42bfd5480a9801386ba8181f6146646eb5ce10eb9051b34ec5d45b24379ad89f
MD5 hash:
c866e52d639d0932fd9c662f417c0cc0
SHA1 hash:
377db167f355b1bda3f10357feaf119c6aeeaf37
SH256 hash:
abf0a7d34d6187eea645643b45c99eeb12778ef1ad803d56caebe96b05aca52e
MD5 hash:
fc8aa247e3276097e369173274da8cff
SHA1 hash:
6f068a0b08f4deffef0c623b3ad86171f7af59f9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe abf0a7d34d6187eea645643b45c99eeb12778ef1ad803d56caebe96b05aca52e

(this sample)

  
Delivery method
Distributed via web download

Comments