MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b367760b3de8efbaceb0c71acb3fe5763e164e89ec88390adb5b5a2cc85467a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments 1

SHA256 hash: b367760b3de8efbaceb0c71acb3fe5763e164e89ec88390adb5b5a2cc85467a9
SHA3-384 hash: 963bdce36bb66128894a60fe8590d187be70ced7ac5530c2796a3e71ed4fcb179ce5d04342a342fad37948f7a576bd11
SHA1 hash: cb33d55e153180e5d7a636272709e3ca943bc8ed
MD5 hash: 673b15b93a2b99064e769b085780dfeb
humanhash: cold-shade-red-one
File name:673b15b93a2b99064e769b085780dfeb
Download: download sample
Signature RedLineStealer
File size:843'264 bytes
First seen:2021-10-28 06:44:21 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 682b88463c7583e0323d7851be5034d8 (6 x RedLineStealer)
ssdeep 24576:Vn2cH2oi0UZEc3D8cBU3ZoAoU6PfSe7th:Vn2cH29dvrP
Threatray 37 similar samples on MalwareBazaar
TLSH T118053CC6E173608EDBA278780B0195E249430E7E1B129EF56F75BA5A15F36D1CACB303
File icon (PE):PE icon
dhash icon ccb2b2f0b0b2ccd4 (9 x RedLineStealer, 1 x RaccoonStealer, 1 x AilurophileStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Sending a custom TCP request
Creating a window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Launching a service
DNS request
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-debug anti-vm packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 510767 Sample: RpC5PqzDnq Startdate: 28/10/2021 Architecture: WINDOWS Score: 100 26 youbotter.click 2->26 44 Multi AV Scanner detection for domain / URL 2->44 46 Found malware configuration 2->46 48 Antivirus detection for URL or domain 2->48 50 5 other signatures 2->50 7 RpC5PqzDnq.exe 15 7 2->7         started        12 bghost.exe 2->12         started        14 bghost.exe 2->14         started        signatures3 process4 dnsIp5 28 185.255.133.25, 18225, 49768 SUPERSERVERSDATACENTERRU Russian Federation 7->28 30 duiwqyue.digital 104.21.41.105, 443, 49771 CLOUDFLARENETUS United States 7->30 32 192.168.2.1 unknown unknown 7->32 20 C:\Users\user\AppData\Local\Temp\bghost.exe, PE32+ 7->20 dropped 22 C:\Users\user\AppData\...\RpC5PqzDnq.exe.log, ASCII 7->22 dropped 52 Detected unpacking (creates a PE file in dynamic memory) 7->52 54 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 7->54 56 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 7->56 58 2 other signatures 7->58 16 bghost.exe 1 1 7->16         started        34 youbotter.click 12->34 36 youbotter.click 14->36 file6 signatures7 process8 dnsIp9 24 youbotter.click 167.71.28.113, 49773, 49775, 49808 DIGITALOCEAN-ASNUS United States 16->24 38 Antivirus detection for dropped file 16->38 40 Multi AV Scanner detection for dropped file 16->40 42 Machine Learning detection for dropped file 16->42 signatures10
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-10-23 16:05:10 UTC
AV detection:
20 of 27 (74.07%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:onyxxins discovery infostealer persistence spyware stealer upx
Behaviour
GoLang User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.255.133.25:18225
Unpacked files
SH256 hash:
c04d037cf0fbaf1aa229ccb9292893d43f6500385f2b84b3137bad01e4d3da8f
MD5 hash:
181a9b7e01b1d1a119555d408e944a7a
SHA1 hash:
d840252cb1510b5811d26b4e53c16cabbe8476b0
SH256 hash:
d278ab347adf5db98ac6694bdd8b9d21222e9534fbf731889489f0beded5974a
MD5 hash:
ab42038aa6020e4c9c97fa67189b6152
SHA1 hash:
1aab964369f54c3dc5e57fdf07192adfce9904e4
SH256 hash:
b367760b3de8efbaceb0c71acb3fe5763e164e89ec88390adb5b5a2cc85467a9
MD5 hash:
673b15b93a2b99064e769b085780dfeb
SHA1 hash:
cb33d55e153180e5d7a636272709e3ca943bc8ed
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe b367760b3de8efbaceb0c71acb3fe5763e164e89ec88390adb5b5a2cc85467a9

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-10-28 06:44:24 UTC

url : hxxp://kjbd6dy.jelikob.ru/102110844.exe