MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b498051067a8664f7b36062a15c0e03e8f6cb5cdb071116a74f96ee99aed7e1a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 2 YARA File information Comments

SHA256 hash: b498051067a8664f7b36062a15c0e03e8f6cb5cdb071116a74f96ee99aed7e1a
SHA3-384 hash: ae097b3a686f3b31cc915ebec584c69ee511e82f48ea9a78d1a7749932b89771ff3f57ce2c6d1e4931c5e5ab03f9e590
SHA1 hash: 604ac4cdd1a8b9fd786143e61f4245ec38d275dc
MD5 hash: 6a99b8773a863ade686a076af7db222d
humanhash: three-jig-carolina-bluebird
File name:B498051067A8664F7B36062A15C0E03E8F6CB5CDB0711.exe
Download: download sample
Signature RedLineStealer
File size:914'432 bytes
First seen:2021-05-03 11:25:49 UTC
Last seen:2021-05-03 12:01:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'606 x Formbook, 12'242 x SnakeKeylogger)
ssdeep 24576:xIzEZQ/pEXC/aPaKgP4Jp7tDCDIi7VQZUYUa:xUBpEXCCc4Jp7pCZVBy
Threatray 459 similar samples on MalwareBazaar
TLSH 13158CA579018D91D648177FC0CB40040374DDD463A3E70B77AB72AA25B27BBBC99ACB
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://erherst.ml/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://erherst.ml/ https://threatfox.abuse.ch/ioc/28218/
45.128.150.56:80 https://threatfox.abuse.ch/ioc/28219/

Intelligence


File Origin
# of uploads :
2
# of downloads :
106
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Unauthorized injection to a recently created process
Creating a file
DNS request
Connection attempt
Sending an HTTP POST request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected AntiVM3
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-03-27 03:51:56 UTC
AV detection:
24 of 29 (82.76%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:2611 infostealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
RedLine
RedLine Payload
Malware Config
C2 Extraction:
erherst.ml:80
Unpacked files
SH256 hash:
afb36a2aa2d12a7cf499151b8c0a3083c11c05f872e995db4fbb72664db1d0dc
MD5 hash:
bc74b23a2221851b8e355e65c71a953a
SHA1 hash:
ffdf616f1ae4d8c8583a52822bc366393d6fad96
SH256 hash:
fdefe8a318f88eaa88e39675ffff1ecf338142ef9cfe84a9198ac7f1dcf32f18
MD5 hash:
986582dc2c5749f3023996ae04ae5039
SHA1 hash:
c69d3613b948f91c5c3bce6d71fcad082a295744
SH256 hash:
a10fd61087610e1a561eaac624826e8427c8021cd94572cfc93f0cc2be6076c8
MD5 hash:
394616e3acf0b1a1248dd4d8f38591eb
SHA1 hash:
7935ce781a562ba819f075455ba6f3d13c9ee76c
SH256 hash:
b498051067a8664f7b36062a15c0e03e8f6cb5cdb071116a74f96ee99aed7e1a
MD5 hash:
6a99b8773a863ade686a076af7db222d
SHA1 hash:
604ac4cdd1a8b9fd786143e61f4245ec38d275dc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments