MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b9e2a41e63b1886285d2617ad4f820db9ff5d1133b47e90b52368d3b87333684. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 1 File information Comments

SHA256 hash: b9e2a41e63b1886285d2617ad4f820db9ff5d1133b47e90b52368d3b87333684
SHA3-384 hash: 6521fdcbf347235dcaaa8486770aa8e3f5a6829dac0495cd1d3b0e5712704d3747c718b0446cb1cef7467c6ecb228bb6
SHA1 hash: 51e2d101c5b0d68cc206bfe9de9a4b7666cbd712
MD5 hash: aab7b335612bb27d5aa1ab2b00e1a452
humanhash: tango-nine-early-steak
File name:aab7b335612bb27d5aa1ab2b00e1a452.exe
Download: download sample
Signature RedLineStealer
File size:389'632 bytes
First seen:2021-06-11 11:15:45 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c79d21a18d2d983f887085ba949c12f3 (5 x Smoke Loader, 4 x RedLineStealer, 4 x RaccoonStealer)
ssdeep 6144:Asf5x6seMvL9UvBrk4OI12ssnRh7VL1Se9qcsUEnjitVneyRH:Asf5xRDj9srk4d12ssnRn7aTjKn
Threatray 804 similar samples on MalwareBazaar
TLSH 90849E10B790D034F1F336B45A7792BDA62D7DE1EB2450CB62D4AAEA56346E0EC31707
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
194.156.67.100:48883

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
194.156.67.100:48883 https://threatfox.abuse.ch/ioc/86378/

Intelligence


File Origin
# of uploads :
1
# of downloads :
153
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
aab7b335612bb27d5aa1ab2b00e1a452.exe
Verdict:
Malicious activity
Analysis date:
2021-06-11 11:18:27 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Sending an HTTP POST request
DNS request
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a file
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-06-07 04:17:00 UTC
AV detection:
23 of 29 (79.31%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:mix2 discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
194.156.67.100:48883
Unpacked files
SH256 hash:
9eb624f017f17c8b8c2557d9db6ada8ac15471b5a00632d9becbd32d4da610a9
MD5 hash:
a75be83de22a24d4d1c3739657c0d7bc
SHA1 hash:
e7b16b6f2344c239b917f60eb88b30313b2c24a3
SH256 hash:
4362c9145ad0b3d2cab4f8838390a8b83909fcb4933f7b00fb63a33b83d09116
MD5 hash:
eb0315e9c6759a6d2cd63eed132d9d95
SHA1 hash:
472f1b78c7b0392798dafe7b4ca3bc4bc26d7a0a
SH256 hash:
ac1da29c05a880adf1713f24a9c6a209a7d88f8a62ac02e1cd8667e93f83be3e
MD5 hash:
51e0dab48d82107745d1e1faa5fe24e1
SHA1 hash:
09ad526b91e76670f53e07b02bf47fe708b85205
SH256 hash:
b9e2a41e63b1886285d2617ad4f820db9ff5d1133b47e90b52368d3b87333684
MD5 hash:
aab7b335612bb27d5aa1ab2b00e1a452
SHA1 hash:
51e2d101c5b0d68cc206bfe9de9a4b7666cbd712
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments