MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ba59622733f580592e807c44751503149a54f104b593b097dee0d6cd9e314bcc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: ba59622733f580592e807c44751503149a54f104b593b097dee0d6cd9e314bcc
SHA3-384 hash: be5942e32fffc90cf8ce0cca406ff0bc5c2e989db62a1814c0c5da5e85d6f3e3aadca3a80cb9c961706856048ad77d7f
SHA1 hash: 948b8a0a70da414ada34cadcf06d1c5d1941649b
MD5 hash: a5dac566745c199a3e0d2358c53a8d66
humanhash: river-triple-edward-august
File name:a5dac566745c199a3e0d2358c53a8d66.exe
Download: download sample
Signature RedLineStealer
File size:459'776 bytes
First seen:2021-10-18 20:12:41 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f326f88ca83c9aacaa44acfb8884f1d4 (8 x RedLineStealer, 4 x DCRat, 2 x CoinMiner)
ssdeep 12288:a5oaqjp/9T6QYXDKWPJZso//Ol8VlfylFUnR:a5v4DT6Jh//u8VlQE
Threatray 1'671 similar samples on MalwareBazaar
TLSH T102A4F05AA2E51098DAF441F7D9620746E73034791B25A3DB1BB813B70B2B9C99F3D3C4
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
279
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process from a recently created file
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the Windows subdirectories
Deleting a recently created file
Replacing files
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
67%
Tags:
diztakun packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
45 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected BatToExe compiled binary
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 505072 Sample: PIWVjhXPs3.exe Startdate: 18/10/2021 Architecture: WINDOWS Score: 45 32 Multi AV Scanner detection for submitted file 2->32 34 Yara detected BatToExe compiled binary 2->34 7 PIWVjhXPs3.exe 9 2->7         started        process3 file4 24 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 7->24 dropped 10 cmd.exe 3 7->10         started        12 conhost.exe 7->12         started        process5 process6 14 extd.exe 1 10->14         started        17 extd.exe 2 10->17         started        20 extd.exe 2 10->20         started        22 extd.exe 1 10->22         started        dnsIp7 36 Multi AV Scanner detection for dropped file 14->36 26 cdn.discordapp.com 162.159.129.233, 443, 49713 CLOUDFLARENETUS United States 17->26 28 192.168.2.1 unknown unknown 17->28 30 162.159.130.233, 443, 49718 CLOUDFLARENETUS United States 20->30 signatures8
Threat name:
ByteCode-MSIL.Trojan.Miner
Status:
Malicious
First seen:
2021-10-18 15:59:58 UTC
AV detection:
10 of 28 (35.71%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer upx
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
Unpacked files
SH256 hash:
ba59622733f580592e807c44751503149a54f104b593b097dee0d6cd9e314bcc
MD5 hash:
a5dac566745c199a3e0d2358c53a8d66
SHA1 hash:
948b8a0a70da414ada34cadcf06d1c5d1941649b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe ba59622733f580592e807c44751503149a54f104b593b097dee0d6cd9e314bcc

(this sample)

  
Delivery method
Distributed via web download

Comments