MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ad7c5a0fb3bcfafed608b33c38ce110e50aa4158906abfc8092a660b6b2ea133. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 5 File information Comments

SHA256 hash: ad7c5a0fb3bcfafed608b33c38ce110e50aa4158906abfc8092a660b6b2ea133
SHA3-384 hash: 976c6a60776a716397950ac76c695544408838e47fa0e62d275985e5acdcdbdeb7010468d1ac04286cb8fcd397b00deb
SHA1 hash: beb13518af26b5e0b94f14e2c26f638f1e1a682d
MD5 hash: 432e0aa89b16204307d034dbb0bf5934
humanhash: mobile-red-jupiter-network
File name:LauncherHack.exe
Download: download sample
Signature RedLineStealer
File size:813'984 bytes
First seen:2021-10-31 07:05:32 UTC
Last seen:2021-10-31 08:53:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'463 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:q8ml5VY/nUFuZRJvhQccv1kDvq4La8gu9VngrukOInm+GH9/JyqjxK:qN5VY/rJvhEv1gmUVgKkrnbGH9/J7xK
Threatray 630 similar samples on MalwareBazaar
TLSH T1B605999F20DA81C0CD67BD31D5A35D20AB2E1C91C3AA47B9EF36F5C896391111D3BE86
File icon (PE):PE icon
dhash icon 8e33694d6961338e (1 x RedLineStealer)
Reporter tech_skeech
Tags:CoinMiner exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
271
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
LauncherHack.exe
Verdict:
Malicious activity
Analysis date:
2021-10-31 07:04:05 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Forced shutdown of a system process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BitCoin Miner RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Creates a thread in another existing process (thread injection)
Found malware configuration
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected BitCoin Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 512361 Sample: LauncherHack.exe Startdate: 31/10/2021 Architecture: WINDOWS Score: 100 70 Found malware configuration 2->70 72 Multi AV Scanner detection for submitted file 2->72 74 Yara detected BitCoin Miner 2->74 76 2 other signatures 2->76 13 LauncherHack.exe 3 2->13         started        17 wqet.exe 2->17         started        process3 file4 62 C:\Users\user\...\LauncherHack.exe.log, ASCII 13->62 dropped 108 Writes to foreign memory regions 13->108 110 Injects a PE file into a foreign processes 13->110 19 RegAsm.exe 15 7 13->19         started        112 Antivirus detection for dropped file 17->112 114 Multi AV Scanner detection for dropped file 17->114 116 Allocates memory in foreign processes 17->116 118 Creates a thread in another existing process (thread injection) 17->118 24 conhost.exe 5 17->24         started        signatures5 process6 dnsIp7 66 141.94.188.139, 43059, 49683 DFNVereinzurFoerderungeinesDeutschenForschungsnetzese Germany 19->66 68 cdn.discordapp.com 162.159.134.233, 443, 49685 CLOUDFLARENETUS United States 19->68 60 C:\Users\user\AppData\Local\Temp\fl.exe, PE32+ 19->60 dropped 78 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->78 80 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->80 82 Tries to harvest and steal browser information (history, passwords, etc) 19->82 26 fl.exe 19->26         started        29 sihost32.exe 24->29         started        file8 signatures9 process10 signatures11 98 Antivirus detection for dropped file 26->98 100 Multi AV Scanner detection for dropped file 26->100 102 Writes to foreign memory regions 26->102 31 conhost.exe 4 26->31         started        104 Allocates memory in foreign processes 29->104 106 Creates a thread in another existing process (thread injection) 29->106 34 conhost.exe 2 29->34         started        process12 file13 64 C:\Users\user\AppData\Local\Temp\wqet.exe, PE32+ 31->64 dropped 36 cmd.exe 1 31->36         started        38 cmd.exe 1 31->38         started        process14 signatures15 41 wqet.exe 36->41         started        44 conhost.exe 36->44         started        90 Uses schtasks.exe or at.exe to add and modify task schedules 38->90 46 conhost.exe 38->46         started        48 schtasks.exe 1 38->48         started        process16 signatures17 92 Writes to foreign memory regions 41->92 94 Allocates memory in foreign processes 41->94 96 Creates a thread in another existing process (thread injection) 41->96 50 conhost.exe 3 41->50         started        process18 file19 58 C:\Users\user\AppData\...\sihost32.exe, PE32+ 50->58 dropped 53 sihost32.exe 50->53         started        process20 signatures21 84 Writes to foreign memory regions 53->84 86 Allocates memory in foreign processes 53->86 88 Creates a thread in another existing process (thread injection) 53->88 56 conhost.exe 2 53->56         started        process22
Threat name:
ByteCode-MSIL.Infostealer.Generic
Status:
Suspicious
First seen:
2021-10-31 07:03:04 UTC
AV detection:
4 of 44 (9.09%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks installed software on the system
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
141.94.188.139:43059
Unpacked files
SH256 hash:
16c07aa506ab7024840df5af1378532c763f3c8db08bfc6af05d7811ceced731
MD5 hash:
9ef4dd27df7bfe3ce7bac547e7064d28
SHA1 hash:
acee208c5f803322d4a2c781923cac2043061238
SH256 hash:
ad7c5a0fb3bcfafed608b33c38ce110e50aa4158906abfc8092a660b6b2ea133
MD5 hash:
432e0aa89b16204307d034dbb0bf5934
SHA1 hash:
beb13518af26b5e0b94f14e2c26f638f1e1a682d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe ad7c5a0fb3bcfafed608b33c38ce110e50aa4158906abfc8092a660b6b2ea133

(this sample)

  
Delivery method
Distributed via web download

Comments