MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b0349c9cc5d6db524ba113866432e1e0b1cf309e60ad5c3281fb00b27d1bdd30. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: b0349c9cc5d6db524ba113866432e1e0b1cf309e60ad5c3281fb00b27d1bdd30
SHA3-384 hash: e2fac43f1cc3e5f34a05bf1820252d42706834c8a8505e7b9ddd93b96c2ba83c5b054212859725d0b679b0e967f27a5a
SHA1 hash: d63d2228f149c80ec4d57dc7a3091d1be408e15a
MD5 hash: fd8bcbbf4a48d94cbbc341d3e0f46d3d
humanhash: california-cola-kitten-fifteen
File name:launch.bin
Download: download sample
Signature RedLineStealer
File size:1'371'808 bytes
First seen:2022-07-17 18:20:33 UTC
Last seen:2022-07-17 18:38:48 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c0eb91ea5ba6f3145175fdc64626214c (2 x RedLineStealer)
ssdeep 24576:ZilgBKUzYAY/O5WtVMiyjKBE5GmAOdqGdLps:ZilgBG/WGmAOdqGdG
TLSH T185558D29EB8629F4DA175731859EEB7B9B18BA148032EF3FFF0ADE08A4334163C45155
TrID 36.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
23.5% (.EXE) Win64 Executable (generic) (10523/12/4)
11.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
10.0% (.EXE) Win32 Executable (generic) (4505/5/1)
4.5% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter KdssSupport
Tags:exe RedLineStealer


Avatar
KdssSupport
Uploaded with API

Intelligence


File Origin
# of uploads :
2
# of downloads :
395
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
https://www.mediafire.com/file/xshwbwu20vk910z/CyberHack%2528the_cycle_frontire%2529.zip/file
Verdict:
Malicious activity
Analysis date:
2022-07-17 15:55:29 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
evad.troj.spyw
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates files in the system32 config directory
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
Potential dropper URLs found in powershell memory
Powershell drops PE file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses cmd line tools excessively to alter registry or file data
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 667493 Sample: launch.exe Startdate: 17/07/2022 Architecture: WINDOWS Score: 100 83 store5.gofile.io 2->83 101 Snort IDS alert for network traffic 2->101 103 Malicious sample detected (through community Yara rule) 2->103 105 Antivirus detection for URL or domain 2->105 107 11 other signatures 2->107 10 launch.exe 1 2->10         started        13 powershell.exe 2->13         started        15 powershell.exe 2->15         started        17 powershell.exe 2->17         started        signatures3 process4 signatures5 135 Contains functionality to inject code into remote processes 10->135 137 Writes to foreign memory regions 10->137 139 Injects a PE file into a foreign processes 10->139 19 AppLaunch.exe 15 7 10->19         started        24 conhost.exe 10->24         started        141 Modifies the context of a thread in another process (thread injection) 13->141 26 dllhost.exe 13->26         started        28 conhost.exe 13->28         started        30 updater.exe 15->30         started        32 conhost.exe 15->32         started        34 conhost.exe 17->34         started        process6 dnsIp7 85 213.226.123.155, 2014, 49756 E-STYLEISP-ASRU Russian Federation 19->85 87 store5.gofile.io 31.14.70.246, 443, 49759 LINKER-ASFR Virgin Islands (BRITISH) 19->87 79 C:\Users\user\AppData\Local\...\Installer.exe, PE32+ 19->79 dropped 121 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->121 123 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->123 125 Tries to harvest and steal browser information (history, passwords, etc) 19->125 36 Installer.exe 5 19->36         started        127 Writes to foreign memory regions 26->127 129 Creates a thread in another existing process (thread injection) 26->129 131 Injects a PE file into a foreign processes 26->131 39 lsass.exe 26->39 injected 41 winlogon.exe 26->41 injected 43 svchost.exe 26->43 injected 45 dwm.exe 26->45 injected 89 192.168.11.1 unknown unknown 30->89 133 Encrypted powershell cmdline option found 30->133 47 powershell.exe 30->47         started        file8 signatures9 process10 signatures11 109 Antivirus detection for dropped file 36->109 111 Very long command line found 36->111 113 Machine Learning detection for dropped file 36->113 119 3 other signatures 36->119 49 cmd.exe 36->49         started        52 cmd.exe 36->52         started        54 powershell.exe 36->54         started        58 2 other processes 36->58 115 Writes to foreign memory regions 39->115 117 Creates files in the system32 config directory 47->117 56 conhost.exe 47->56         started        process12 file13 91 Uses cmd line tools excessively to alter registry or file data 49->91 93 Uses schtasks.exe or at.exe to add and modify task schedules 49->93 95 Uses powercfg.exe to modify the power settings 49->95 61 conhost.exe 49->61         started        63 sc.exe 49->63         started        65 sc.exe 49->65         started        75 21 other processes 49->75 97 Modifies power options to not sleep / hibernate 52->97 67 conhost.exe 52->67         started        69 powercfg.exe 52->69         started        77 3 other processes 52->77 99 Powershell drops PE file 54->99 71 conhost.exe 54->71         started        81 C:\Program Files\Chrome\updater.exe, PE32+ 58->81 dropped 73 conhost.exe 58->73         started        signatures14 process15
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-07-10 16:51:12 UTC
File Type:
PE (Exe)
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery evasion exploit infostealer spyware
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Modifies registry key
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Modifies file permissions
Downloads MZ/PE file
Executes dropped EXE
Possible privilege escalation attempt
Stops running service(s)
Modifies security service
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
213.226.123.155:2014
Unpacked files
SH256 hash:
3330bc2e12e42a7e4847289dc549bf5520ba54cc18c230f322e8de6c5146c88d
MD5 hash:
b7e09557508e3d17210e85356a6e9437
SHA1 hash:
7020a287b7142aca734cf02101cf05d89aca7c56
SH256 hash:
b0349c9cc5d6db524ba113866432e1e0b1cf309e60ad5c3281fb00b27d1bdd30
MD5 hash:
fd8bcbbf4a48d94cbbc341d3e0f46d3d
SHA1 hash:
d63d2228f149c80ec4d57dc7a3091d1be408e15a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe b0349c9cc5d6db524ba113866432e1e0b1cf309e60ad5c3281fb00b27d1bdd30

(this sample)

  
Delivery method
Distributed via web download

Comments