MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 b7fb2a89508e5c147476b6c46e8e4ef0c73bd54603b5bbb75251b25b700e41ef. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | b7fb2a89508e5c147476b6c46e8e4ef0c73bd54603b5bbb75251b25b700e41ef |
|---|---|
| SHA3-384 hash: | 3e2dbea49ee72bc582b5f3a7c6d69c57c342052f78699a92841ab762242d2d6f03192a469ad71f9aff7156ce0532b20e |
| SHA1 hash: | fed56e70e1929499b2dbee3526803df61956aeaf |
| MD5 hash: | 231adc1351af6b50967f905fe810382c |
| humanhash: | lima-cup-stream-edward |
| File name: | 231adc1351af6b50967f905fe810382c.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 490'496 bytes |
| First seen: | 2023-05-10 08:10:20 UTC |
| Last seen: | 2023-05-13 22:41:37 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 12288:yMrsy908HJ9VEEG8HCvy0LgJwd910t4yMeB3rjjf:KyZHxg8o8G/3aBXjf |
| Threatray | 291 similar samples on MalwareBazaar |
| TLSH | T1E4A40203F7D44037D9B56BF08CF602931A36BCB24CB5936B2B85685F19B2690A97173B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
3
# of downloads :
258
Origin country :
NLVendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
231adc1351af6b50967f905fe810382c.exe
Verdict:
Malicious activity
Analysis date:
2023-05-10 08:12:44 UTC
Tags:
rat redline trojan amadey loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
RedLine
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Creating a window
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Stealing user critical data
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
advpack.dll anti-vm CAB greyware installer packed rundll32.exe setupapi.dll shell32.dll
Verdict:
Malicious
Labled as:
TR/Dropper.Generic
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Deyma
Verdict:
Malicious
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2023-05-10 08:11:11 UTC
File Type:
PE (Exe)
Extracted files:
79
AV detection:
21 of 24 (87.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 281 additional samples on MalwareBazaar
Result
Malware family:
redline
Score:
10/10
Tags:
family:redline botnet:divan discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Modifies Windows Defender Real-time Protection settings
RedLine
Malware Config
C2 Extraction:
217.196.96.102:4132
Unpacked files
SH256 hash:
88f908ec9381db433daeb025a97d784364412cabf024a177b90614378eca686e
MD5 hash:
5a0e8aa008ea32c2bbc5081c67fc8c64
SHA1 hash:
1ec55b71ee72456807c0d118878c798faa63e709
SH256 hash:
7440ce05680364b95c404ed9ec48fb9e8a987350a360172ead71a317ce40eb8b
MD5 hash:
e99c41b862e72302c6d8cfe3b8818e22
SHA1 hash:
b149034eb4965ccf3a09dc10159a60757cfcb46d
SH256 hash:
ef45a94d053e621ee6e7033c7ef117fc0ea330ccfdb6b01bb06e40c757716619
MD5 hash:
4fa98b3253cd340453f465d5bdcec232
SHA1 hash:
02100eac7d7d21c09b877015a8a142704dfba4bf
Detections:
redline
Parent samples :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 hash:
eb7e2063450f3e234c47f18f2b005ee9537c79ee30ecec57c9c960c49466222f
MD5 hash:
18d01903826a09f72ec66338ef78aaed
SHA1 hash:
0bd799d068c5029c28bf2d9bc4f8b78038741b9b
Detections:
Amadey
Parent samples :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 hash:
b7fb2a89508e5c147476b6c46e8e4ef0c73bd54603b5bbb75251b25b700e41ef
MD5 hash:
231adc1351af6b50967f905fe810382c
SHA1 hash:
fed56e70e1929499b2dbee3526803df61956aeaf
Malware family:
RedNet
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.