MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c0da5841ddfc29dc9eea7d8d9e42d981385602f21025ec47798d302c3ef50096. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: c0da5841ddfc29dc9eea7d8d9e42d981385602f21025ec47798d302c3ef50096
SHA3-384 hash: e24dc3e49ea919e63278f10b9545213a3961d68c334f13f58ac89b95c40b72f78a96b6e8ac8cc0ec612188eac52de705
SHA1 hash: 116815a43e5d9c6ae9dc998e93948e274209711a
MD5 hash: 1330be0f9459506cfd3d972082f3cb0e
humanhash: sweet-ack-ack-quebec
File name:1330be0f9459506cfd3d972082f3cb0e.exe
Download: download sample
Signature RedLineStealer
File size:1'311'356 bytes
First seen:2021-10-01 05:57:00 UTC
Last seen:2021-10-01 08:50:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ae9f6a32bb8b03dce37903edbc855ba1 (28 x CryptOne, 18 x RedLineStealer, 15 x njrat)
ssdeep 24576:xry2uXzmcuN/rHhPw3mHMLNXJqKZa5jQQiE3soduAP/f49Y0wGIS:xunQN/rBPwWH+7ZJGdXP/Q9YTS
Threatray 1'055 similar samples on MalwareBazaar
TLSH T18A55E02135A79871E0751C344AB9B66E557C7D310F2F168BA390063A5E387F0BB33AE6
File icon (PE):PE icon
dhash icon 706070d2f064f0f1 (2 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.180.220.105:11915

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.180.220.105:11915 https://threatfox.abuse.ch/ioc/229360/

Intelligence


File Origin
# of uploads :
2
# of downloads :
105
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1330be0f9459506cfd3d972082f3cb0e.exe
Verdict:
Malicious activity
Analysis date:
2021-10-01 05:59:12 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Creating a file in the %temp% subdirectories
Launching a process
Searching for the Image Viewer window
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Reline
Status:
Malicious
First seen:
2021-10-01 05:57:10 UTC
AV detection:
13 of 45 (28.89%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:new1 infostealer spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.180.220.105:11915
Unpacked files
SH256 hash:
fc05724dfff4e43a5af02a254628667342c65570283bc26ec75932202ff94f3f
MD5 hash:
88baa69b89d5e255b6fd13dff3936fee
SHA1 hash:
d026aa1f6fcf15e96438ed8da818d3f424ab9660
SH256 hash:
99317e8b8e444c32dcc5f30b62f7e59dc2421c4315ccd2a20864cad8866b75a0
MD5 hash:
8d4571215ca94281e6bc7ea51f66c7e1
SHA1 hash:
7880ba6320abf83db123b4799db77a5abd025327
SH256 hash:
c0da5841ddfc29dc9eea7d8d9e42d981385602f21025ec47798d302c3ef50096
MD5 hash:
1330be0f9459506cfd3d972082f3cb0e
SHA1 hash:
116815a43e5d9c6ae9dc998e93948e274209711a
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe c0da5841ddfc29dc9eea7d8d9e42d981385602f21025ec47798d302c3ef50096

(this sample)

  
Delivery method
Distributed via web download

Comments