MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b28088f23be9a22ed95c6ff500e48e8958c7fff6eb288f890665ec6399a6e2af. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 4 File information Comments

SHA256 hash: b28088f23be9a22ed95c6ff500e48e8958c7fff6eb288f890665ec6399a6e2af
SHA3-384 hash: 9f401fb3b7f2ce2e0d91f30b5f74c4ffef4a65883b371183f65684ccadbb32ed89a34cf00ad201b0e835914baf5da0d7
SHA1 hash: ed6517e6d7bac86241895da672444b891719ad30
MD5 hash: 1925c556a3bdd8c909ab20c0030ac6ff
humanhash: black-yankee-georgia-north
File name:PGMB7782283023349PDF.exe
Download: download sample
Signature RedLineStealer
File size:943'616 bytes
First seen:2020-10-23 06:39:04 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'741 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 12288:Rhw6Oz9RJIMQplpdOClvTv7BXijCOPn0owPpDl43Aqkz5PEpklkrkQWsROZbLSHJ:RhsvslpdOCTHG1FdA8rcO2MKKrdH
Threatray 14 similar samples on MalwareBazaar
TLSH D0157CC93100B5DFC413D4B289AC5C70B66078BF831B820B6513666ED99D683DF6A6FB
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
Malspam distributing RedLineStealer:

HELO: usegreenco.com
Sending IP: 50.78.187.17
From: Lydia Yonkers<sales@usegreenco.com>
Subject: Quote Request
Attachment: PGMB7782283023349PDF.IMG (contains "PGMB7782283023349PDF.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
78
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a file
Creating a process from a recently created file
Running batch commands
Launching a process
Unauthorized injection to a recently created process
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Binary contains a suspicious time stamp
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Detected unpacking (changes PE section rights)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected AntiVM_3
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 303020 Sample: PGMB7782283023349PDF.exe Startdate: 23/10/2020 Architecture: WINDOWS Score: 100 42 maranaty.xyz 2->42 54 Multi AV Scanner detection for dropped file 2->54 56 Multi AV Scanner detection for submitted file 2->56 58 Detected unpacking (changes PE section rights) 2->58 60 11 other signatures 2->60 9 PGMB7782283023349PDF.exe 3 2->9         started        signatures3 process4 file5 36 C:\Users\...\PGMB7782283023349PDF.exe.log, ASCII 9->36 dropped 64 Detected unpacking (changes PE section rights) 9->64 66 Injects a PE file into a foreign processes 9->66 68 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 9->68 13 PGMB7782283023349PDF.exe 3 9->13         started        signatures6 process7 dnsIp8 48 192.168.2.1 unknown unknown 13->48 38 C:\Users\user\AppData\Local\...\chrome.exe, PE32 13->38 dropped 40 C:\Users\user\...\chrome.exe:Zone.Identifier, ASCII 13->40 dropped 70 Tries to harvest and steal browser information (history, passwords, etc) 13->70 18 chrome.exe 3 13->18         started        21 cmd.exe 1 13->21         started        file9 signatures10 process11 dnsIp12 50 Injects a PE file into a foreign processes 18->50 24 chrome.exe 15 2 18->24         started        28 chrome.exe 18->28         started        30 chrome.exe 18->30         started        44 127.0.0.1 unknown unknown 21->44 52 Uses ping.exe to sleep 21->52 32 conhost.exe 21->32         started        34 PING.EXE 1 21->34         started        signatures13 process14 dnsIp15 46 maranaty.xyz 24->46 62 Tries to harvest and steal browser information (history, passwords, etc) 24->62 signatures16
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2020-10-22 19:03:14 UTC
AV detection:
23 of 26 (88.46%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
keylogger stealer spyware trojan family:agenttesla
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Deletes itself
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
AgentTesla Payload
AgentTesla
Unpacked files
SH256 hash:
b28088f23be9a22ed95c6ff500e48e8958c7fff6eb288f890665ec6399a6e2af
MD5 hash:
1925c556a3bdd8c909ab20c0030ac6ff
SHA1 hash:
ed6517e6d7bac86241895da672444b891719ad30
SH256 hash:
3607a1b97e801abdda569d2ec52d625cfff4be6c04315fa1409262fb1c84659b
MD5 hash:
b250e8868a27c60a86ce8e25dd914613
SHA1 hash:
04c1f59611e859042bdca401983a9ab6595b7ca0
SH256 hash:
103fb6829771448153884937e2ebbb65de4961388e63e84e08c876219817c8de
MD5 hash:
647ed52190ff35cb9436601ad48b98e0
SHA1 hash:
19a5aa27a234c018c58f18d5df79d03f8e416776
SH256 hash:
d3e37e1d010a43011f61b3db7e696ef6aa050d8e7137e1195b4f177bfdeb9cbe
MD5 hash:
3621510e89eaf78c166e89b75cfa965e
SHA1 hash:
664a65321ce3bad4ba32cd556c57bb1e107b2c3b
Detections:
win_redline_stealer_g0
SH256 hash:
bac5797bde4b2810766a40d95bcdb825ac5b395fcbadd139daa19a44a6cdc049
MD5 hash:
a92cc1f6e0a2742350dfda6726db14c0
SHA1 hash:
e5404e3ed46498deb8ad8966a774540c2b8e9c1e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Ping_Del_method_bin_mem
Author:James_inthe_box
Description:cmd ping IP nul del
Rule name:Select_from_enumeration
Author:James_inthe_box
Description:IP and port combo
Rule name:Steam_stealer_bin_mem
Author:James_inthe_box
Description:Steam in files like avemaria
Rule name:Telegram_stealer_bin_mem
Author:James_inthe_box
Description:Telegram in files like avemaria

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

RedLineStealer

Executable exe b28088f23be9a22ed95c6ff500e48e8958c7fff6eb288f890665ec6399a6e2af

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments