MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bea0911280cb4fef061dc70fe4fbb4f5c89716ac6d05b7bd383ae593da116d1d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 4 File information Comments

SHA256 hash: bea0911280cb4fef061dc70fe4fbb4f5c89716ac6d05b7bd383ae593da116d1d
SHA3-384 hash: f03a1044fae6ad4f680cfe6eaab41183515b097290ae12fe153d8f48c62bde85595af9f5b726a6cb42eef2c79c556a45
SHA1 hash: 04de18289a6a5c8050c34f8c1c55f84a29da4cc2
MD5 hash: 5d292e2f93b3c930e9b1acc52364f755
humanhash: lamp-mississippi-may-south
File name:Overdue-invoices-Statement-09202024.exe
Download: download sample
Signature RedLineStealer
File size:807'765 bytes
First seen:2024-09-20 13:56:15 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 890e522b31701e079a367b89393329e6 (25 x Formbook, 12 x AgentTesla, 8 x Loda)
ssdeep 24576:tthEVaPqLD+EaZROtz07UZAjfAAk+Ytd3:VEVUcyBZyz04ZC4Vd3
Threatray 775 similar samples on MalwareBazaar
TLSH T16E053393B6A4B422E8F41774D1E38B82DAA07691B37C467F6104260B4CCF1259DBBF2D
TrID 86.7% (.EXE) AutoIt3 compiled script executable (510622/80/67)
4.5% (.EXE) UPX compressed Win32 Executable (27066/9/6)
4.5% (.EXE) Win32 EXE Yoda's Crypter (26569/9/4)
1.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
0.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
Magika pebin
File icon (PE):PE icon
dhash icon b150b26869b2d471 (468 x Formbook, 101 x RedLineStealer, 94 x AgentTesla)
Reporter Anonymous
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
424
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Overdue-invoices-Statement-09202024.exe
Verdict:
No threats detected
Analysis date:
2024-09-20 14:04:18 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
96.5%
Tags:
Encryption Stealth Trojan Heur
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file in the %temp% directory
Creating a file
Creating a process from a recently created file
Launching a process
Сreating synchronization primitives
DNS request
Enabling autorun by creating a file
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm autoit lolbin masquerade microsoft_visual_cc monero overlay packed packed packed shell32 upx
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Snake Keylogger
Verdict:
Malicious
Result
Threat name:
n/a
Detection:
malicious
Classification:
n/a
Score:
72 / 100
Signature
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Snakekeylogger
Status:
Malicious
First seen:
2024-09-20 13:23:26 UTC
File Type:
PE (Exe)
Extracted files:
54
AV detection:
22 of 38 (57.89%)
Threat level:
  2/5
Result
Malware family:
vipkeylogger
Score:
  10/10
Tags:
family:vipkeylogger discovery keylogger stealer upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
AutoIT Executable
Suspicious use of SetThreadContext
Looks up external IP address via web service
Drops startup file
Executes dropped EXE
Loads dropped DLL
UPX packed file
VIPKeylogger
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7197ad45a3aa6ac5806c082220503f9b7a454328b082980d80776cc828ddc842
MD5 hash:
d87cfbefcd076cdce3d8d73da7e684ce
SHA1 hash:
787a1bdcbb30e49f76d40280ceaa24d3cf579628
Detections:
win_404keylogger_g1 MAL_Envrial_Jan18_1
SH256 hash:
4ce484f6aeaf1754b945ab840460e109c7e2b619124235784d19f125cc2db2a2
MD5 hash:
b7beae22af057eba12994bd2c94c788c
SHA1 hash:
60abb4e81cd15f3ab1ffe60289ffe4448821fcf6
Detections:
win_404keylogger_g1 MAL_Envrial_Jan18_1
SH256 hash:
de049f5a6f360fd78f5992e9750e5d4bd78afe171f0166e87a9acdfd8bfb4b35
MD5 hash:
64826fbeebc05e354abbc67d4c6405c5
SHA1 hash:
d3fba95bd5b1ccc95246fd87d53746aa1b3b7e94
Detections:
win_samsam_auto MAL_Malware_Imphash_Mar23_1 SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
bea0911280cb4fef061dc70fe4fbb4f5c89716ac6d05b7bd383ae593da116d1d
MD5 hash:
5d292e2f93b3c930e9b1acc52364f755
SHA1 hash:
04de18289a6a5c8050c34f8c1c55f84a29da4cc2
Detections:
MAL_Malware_Imphash_Mar23_1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser
Author:malware-lu
Rule name:UPXv20MarkusLaszloReiser
Author:malware-lu
Rule name:upx_largefile
Author:k3nr9

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::GetAce
MULTIMEDIA_APICan Play MultimediaWINMM.dll::timeGetTime
WIN_BASE_APIUses Win Base APIKERNEL32.DLL::LoadLibraryA

Comments