MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bfcb8e1f198cdd9a25aa8266c1e39c496434b3afc8fe2e2d3ed40e1cf32eb932. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 4 File information Comments

SHA256 hash: bfcb8e1f198cdd9a25aa8266c1e39c496434b3afc8fe2e2d3ed40e1cf32eb932
SHA3-384 hash: 22476857271043481ec1e164673bf49cf0398d41a9c1c5dda3c98e40b9bae4c6516b0ff3adb2fea1f19e53ecadf21cdd
SHA1 hash: d321a06047a7b678dbf66ec31737ffe616740c56
MD5 hash: 87a55db2012f719d4a0f4f799f5c02cc
humanhash: earth-nineteen-lima-pennsylvania
File name:87A55DB2012F719D4A0F4F799F5C02CC.exe
Download: download sample
Signature RedLineStealer
File size:560'696 bytes
First seen:2021-08-18 00:11:09 UTC
Last seen:2021-08-18 01:07:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'748 x AgentTesla, 19'642 x Formbook, 12'245 x SnakeKeylogger)
ssdeep 6144:3Xkg435JTLsBqTSLNv6u2vg4BZeC7C6nJ6PYvOOD2UGTwoEeHyy:3Xt2Xv4oSSRB8YmwGTAeHd
Threatray 1'240 similar samples on MalwareBazaar
TLSH T182C49CDC8E2C3EC0E17308F41CF6AED22426FC6F24A545A72A4E6D0735168A7757B91E
dhash icon 26e6232b654b4b45 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
34.125.127.142:22010

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
34.125.127.142:22010 https://threatfox.abuse.ch/ioc/191853/

Intelligence


File Origin
# of uploads :
2
# of downloads :
133
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
87A55DB2012F719D4A0F4F799F5C02CC.exe
Verdict:
Suspicious activity
Analysis date:
2021-08-18 00:11:57 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Sending a UDP request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a file
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-MSIL.Worm.SpyBot
Status:
Malicious
First seen:
2021-08-15 00:55:38 UTC
AV detection:
20 of 46 (43.48%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:bomb007 discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
34.125.127.142:22010
Unpacked files
SH256 hash:
3d2318ac0fdf1e571791e8313bd62ffc071b5ec54fd0cac55eee9607b9e0c1a8
MD5 hash:
1b8b6478bbe88b977a260f83bceee916
SHA1 hash:
b313f7203214ec9a0c7595c0bd3cb26959124d62
SH256 hash:
5bb53af5bf7e0aedd1fc06b4c7bb2b24d37b2c4480f8d0f20957df04d7739690
MD5 hash:
c91d085b2a6d8c3e5c721dcbb057e6e3
SHA1 hash:
0740dd308676d8287981112acc54a2d9124ae2b4
SH256 hash:
14fd4bdea58f65a66e9c74cd013055db4cc15ce55fde43fec4083d4bb557d086
MD5 hash:
14909fb69eaa7ce19e66030bf6459247
SHA1 hash:
006390befb10b800536cd992e781964a9a15563d
SH256 hash:
bfcb8e1f198cdd9a25aa8266c1e39c496434b3afc8fe2e2d3ed40e1cf32eb932
MD5 hash:
87a55db2012f719d4a0f4f799f5c02cc
SHA1 hash:
d321a06047a7b678dbf66ec31737ffe616740c56
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments