MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 be06e503bd48a2d5ec4dbb6532ad3ef1abd2d3659fa39baf2c34ebfc49b158cf. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA File information Comments

SHA256 hash: be06e503bd48a2d5ec4dbb6532ad3ef1abd2d3659fa39baf2c34ebfc49b158cf
SHA3-384 hash: a64785227b008e177130df370b0c9f84f558835258e0b6087beb4797098e7ace971ec19676d47d45de5a851fe4c6a0b2
SHA1 hash: 987fa2dec584d70da3c12f78ac777ca571261131
MD5 hash: 897fdc53ce5f26017c224ccab9001e74
humanhash: tennis-dakota-sink-hydrogen
File name:be06e503bd48a2d5ec4dbb6532ad3ef1abd2d3659fa39.exe
Download: download sample
Signature RedLineStealer
File size:5'207'176 bytes
First seen:2022-01-25 17:06:37 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b1f273e55d954a3cd6ab7388915a0485 (3 x Neurevt, 3 x RedLineStealer, 2 x ArkeiStealer)
ssdeep 49152:8zOJB5ZJBK7/stk6SY6stAHzUfj7a3MTP4dUQD69CudgD35GoW8rHZz3r9dT:8KBtKzatHa43Qe9C+i35Go/rvT
Threatray 745 similar samples on MalwareBazaar
TLSH T1E1369F237389613EC46B1976853BD6689C3F7F627922CC4B7BF4694C8F351406A3A60B
File icon (PE):PE icon
dhash icon f8f89c969392ece4 (3 x RedLineStealer, 2 x Formbook, 1 x FickerStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.215.113.107:1433

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.107:1433 https://threatfox.abuse.ch/ioc/328443/

Intelligence


File Origin
# of uploads :
1
# of downloads :
168
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b921d63f6ae85b6d2d3fa919c58fd6a1.exe
Verdict:
Malicious activity
Analysis date:
2022-01-25 16:11:53 UTC
Tags:
trojan amadey loader rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Delayed reading of the file
Sending a custom TCP request
DNS request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
CPUID_Instruction
LanguageCheck
CheckNumberOfProcessor
CheckCmdLine
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
cmd.exe control.exe dotnet.exe expand.exe explorer.exe fingerprint greyware keylogger overlay print.exe regasm.exe replace.exe rundll32.exe
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Zeppelin Ransomware
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Tiggre
Status:
Malicious
First seen:
2022-01-25 17:07:14 UTC
File Type:
PE (Exe)
Extracted files:
79
AV detection:
22 of 28 (78.57%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:gladiator discovery infostealer spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.107:1433
Unpacked files
SH256 hash:
609dd813278c49c248af03fbb9ffe1a4357a103c907fe8e4483e5be6df98a3fb
MD5 hash:
3b50fdc5c080e055f4dcc1280248a67b
SHA1 hash:
b53803f7cc142ddd03c6ff8b6fc5989271b5c7cc
SH256 hash:
6866a8f0b4b14682d933bcef2cc605b594baac247eeecf1c5446b8b3917110d5
MD5 hash:
2423b5508c7d0125f622ea1e204134fc
SHA1 hash:
4e43e1d966a7787c0645bfae279718fe4ceb5ad4
SH256 hash:
2901a4c111d7ae496fd91653078015df82f8dd1826f8f1b54e8545bc98eb132e
MD5 hash:
a0379d6467378342b8df733c37cbefa9
SHA1 hash:
f296428bedb8ee7763572e041dbf15c9b6bb6854
SH256 hash:
47805aceec519944f6baf4a154f7d8bc99bc6c89a02cd8e61c7ee5c6281bd1ab
MD5 hash:
5d3cae38e23dd248cc6e7c1184505cb5
SHA1 hash:
a479200e07d54b851ec67735cac870332013e0f5
SH256 hash:
be06e503bd48a2d5ec4dbb6532ad3ef1abd2d3659fa39baf2c34ebfc49b158cf
MD5 hash:
897fdc53ce5f26017c224ccab9001e74
SHA1 hash:
987fa2dec584d70da3c12f78ac777ca571261131
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments