MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bbd758f37aeef6a57927c486286c6d4725901ecb399ca9b26a0a0936a5b1050b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs 1 YARA 5 File information Comments

SHA256 hash: bbd758f37aeef6a57927c486286c6d4725901ecb399ca9b26a0a0936a5b1050b
SHA3-384 hash: 9b8d0f0b8fb781768e6097e481df0588acb7e0c7239368743ff46ffd8a35ae10fe3c7f85f69bf6e5f4b9998eab0e89b5
SHA1 hash: 455185222f7e8b6e3cd0f4f287d880a978907bc8
MD5 hash: babfb38c74366e690fc07396c3bb772d
humanhash: ack-king-thirteen-finch
File name:babfb38c74366e690fc07396c3bb772d.exe
Download: download sample
Signature RedLineStealer
File size:1'897'908 bytes
First seen:2022-03-12 13:06:06 UTC
Last seen:2022-03-12 14:35:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 56a78d55f3f7af51443e58e0ce2fb5f6 (728 x GuLoader, 451 x Formbook, 295 x Loki)
ssdeep 49152:tus1En9Lj6xyhgyyR95nTJr3356nhLxcjP0ORxFn0zi2Occ:tuJ9H/yNTJT35ehtcjPTF0JOn
Threatray 4'773 similar samples on MalwareBazaar
TLSH T19A95331F06A890E6F60943362F397F673796B00258C29B1F9BE63F4D5A19CE8D2C1716
File icon (PE):PE icon
dhash icon b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.129.97.223:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.129.97.223:80 https://threatfox.abuse.ch/ioc/394390/

Intelligence


File Origin
# of uploads :
2
# of downloads :
279
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Searching for analyzing tools
Сreating synchronization primitives
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Sending a TCP request to an infection source
Stealing user critical data
Query of malicious DNS domain
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
azorult control.exe overlay packed python redline shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine Vidar
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Detected unpacking (changes PE section rights)
Found malware configuration
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to evade analysis by execution special instruction which cause usermode exception
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-03-09 03:11:10 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
33 of 42 (78.57%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:vidar botnet:977 botnet:jamienew discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Vidar Stealer
RedLine
RedLine Payload
Vidar
Malware Config
C2 Extraction:
rtrkolada.xyz:80
https://c.im/@sam3al
https://mas.to/@s4msalo
Unpacked files
SH256 hash:
41929f3a8e56f760e247b251f07477f8a01388d1c7cdf28bd3592b66e76c80c3
MD5 hash:
051fe1b243f8892509836fa6dc0a82c4
SHA1 hash:
6cfddfb20805cbad82e217a70121523f11583a68
SH256 hash:
eb87885ee2172f1c2ac3ebd75178176619d926d37672abd00fb5f68cad8b6734
MD5 hash:
d155c95dbab0042a41c7b036c8efcb6c
SHA1 hash:
8eb5d6b4368db55358c014fdd9f0c6e8f48a1742
SH256 hash:
bbd758f37aeef6a57927c486286c6d4725901ecb399ca9b26a0a0936a5b1050b
MD5 hash:
babfb38c74366e690fc07396c3bb772d
SHA1 hash:
455185222f7e8b6e3cd0f4f287d880a978907bc8
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments