MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c1a7adbef8fb6d94955cbae7dd0dd5c2778eb4cb45e56b73ccc772274bcb55da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 19


Intelligence 19 IOCs YARA 15 File information Comments

SHA256 hash: c1a7adbef8fb6d94955cbae7dd0dd5c2778eb4cb45e56b73ccc772274bcb55da
SHA3-384 hash: 125698782476f274aabb01f268eb214a0292f9bc651000fc2010dab52a0a3e3f6c20ffe201ee278dc371f273350dbcdf
SHA1 hash: 8bbef96ff7a44ff9aba4a88fda35fc523ef28d9b
MD5 hash: 56d53a0986c4e98b6d20e5e9fcace67b
humanhash: mobile-georgia-emma-fruit
File name:file
Download: download sample
Signature RedLineStealer
File size:97'792 bytes
First seen:2024-01-06 20:09:10 UTC
Last seen:2024-01-07 04:05:57 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 1536:9qs+NqLGlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2cteulgS6pY:rqMOY3+zi0ZbYe1g0ujyzdMY
TLSH T1ECA35D20679C9F19EAFD1B74B4B2012043F0E08A9091FB4B4DC1A4E71FA7B865957EF2
TrID 60.4% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.8% (.SCR) Windows screen saver (13097/50/3)
8.7% (.EXE) Win64 Executable (generic) (10523/12/4)
5.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://91.92.251.179/exodus.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
449
Origin country :
US US
Vendor Threat Intelligence
Malware family:
agenttesla
ID:
1
File name:
4363463463464363463463463.exe
Verdict:
Malicious activity
Analysis date:
2024-01-07 02:55:05 UTC
Tags:
loader opendir hausbomber lumma stealer evasion agenttesla systembc nanocore stealc redline phorpiex trojan arechclient2 backdoor socks5systemz proxy gcleaner doina risepro rhadamanthys raccoon amadey botnet quasar marsstealer arkei metastealer asyncrat neoreklami adware

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Sending an HTTP POST request
DNS request
Sending a custom TCP request
Creating a file in the %temp% directory
Reading critical registry keys
Using the Windows Management Instrumentation requests
Creating a window
Sending an HTTP GET request
Creating a process from a recently created file
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm fingerprint hacktool lolbin replace stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine Stealer
Verdict:
Malicious
Result
Threat name:
RedLine, Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Blacklisted process start detected (Windows program)
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Detected Stratum mining protocol
DNS related to crypt mining pools
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the DNS server
Modifies the hosts file
Multi AV Scanner detection for submitted file
Performs DNS TXT record lookups
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ipconfig to lookup or modify the Windows network settings
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses powercfg.exe to modify the power settings
Very long command line found
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1370797 Sample: file.exe Startdate: 06/01/2024 Architecture: WINDOWS Score: 100 77 validssl.online 2->77 79 dag2minaddchgd4cli9bjhjkel98nc4e615cgmbd48n7.net 2->79 81 13 other IPs or domains 2->81 99 Snort IDS alert for network traffic 2->99 101 Found malware configuration 2->101 103 Malicious sample detected (through community Yara rule) 2->103 107 16 other signatures 2->107 9 file.exe 15 53 2->9         started        14 powershell.exe 2->14         started        16 npaizibzh.exe 2 2->16         started        18 svchost.exe 2->18         started        signatures3 105 Performs DNS TXT record lookups 79->105 process4 dnsIp5 97 91.92.251.179, 1334, 49729, 49731 THEZONEBG Bulgaria 9->97 73 C:\Users\user\AppData\Local\...\asdasdadk.exe, PE32+ 9->73 dropped 75 C:\Users\user\AppData\Local\Temp\asdasd.exe, PE32+ 9->75 dropped 141 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 9->141 143 Found many strings related to Crypto-Wallets (likely being stolen) 9->143 145 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 9->145 155 2 other signatures 9->155 20 asdasdadk.exe 1 9->20         started        24 asdasd.exe 15 3 9->24         started        27 conhost.exe 9->27         started        29 notepad.exe 14->29         started        31 WmiPrvSE.exe 14->31         started        33 PING.EXE 14->33         started        37 4 other processes 14->37 147 Suspicious powershell command line found 16->147 149 Very long command line found 16->149 151 Machine Learning detection for dropped file 16->151 153 Bypasses PowerShell execution policy 16->153 35 powershell.exe 16->35         started        file6 signatures7 process8 dnsIp9 65 C:\Users\user\AppData\...\uxfanifufumy.sys, PE32+ 20->65 dropped 109 Sample is not signed and drops a device driver 20->109 39 svchost.exe 20->39         started        91 ssltls.cloud 84.32.84.212, 443, 49740 NTT-LT-ASLT Lithuania 24->91 93 95.216.99.206, 49736, 58004 HETZNER-ASDE Germany 24->93 67 C:\Users\user\AppData\Local\...\npaizibzh.exe, PE32 24->67 dropped 111 Antivirus detection for dropped file 24->111 113 Machine Learning detection for dropped file 24->113 115 Found many strings related to Crypto-Wallets (likely being stolen) 24->115 117 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 24->117 69 C:\Windows\Temp\terzfardvkrs.sys, PE32+ 29->69 dropped 71 C:\Windows\System32\drivers\etc\hosts, ASCII 29->71 dropped 119 Blacklisted process start detected (Windows program) 29->119 121 Uses powercfg.exe to modify the power settings 29->121 123 Modifies the context of a thread in another process (thread injection) 29->123 131 2 other signatures 29->131 43 svchost.exe 29->43         started        45 sc.exe 29->45         started        47 sc.exe 29->47         started        51 7 other processes 29->51 125 Modifies the DNS server 31->125 95 txtc.cloud 172.67.136.82 CLOUDFLARENETUS United States 33->95 127 Uses ping.exe to check the status of other devices and networks 35->127 129 Uses ipconfig to lookup or modify the Windows network settings 35->129 49 conhost.exe 35->49         started        file10 signatures11 process12 dnsIp13 83 207.246.100.198, 10300, 49735 AS-CHOOPAUS United States 39->83 85 glowies.lol 66.29.132.90, 443, 49738 ADVANTAGECOMUS United States 39->85 133 Query firmware table information (likely to detect VMs) 39->133 135 Found strings related to Crypto-Mining 39->135 87 172.104.165.191 LINODE-APLinodeLLCUS United States 43->87 89 getcert.net 104.21.15.201 CLOUDFLARENETUS United States 43->89 137 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 43->137 53 conhost.exe 45->53         started        55 conhost.exe 47->55         started        57 conhost.exe 51->57         started        59 conhost.exe 51->59         started        61 conhost.exe 51->61         started        63 4 other processes 51->63 signatures14 139 Detected Stratum mining protocol 83->139 process15
Threat name:
ByteCode-MSIL.Infostealer.RedLine
Status:
Malicious
First seen:
2024-01-06 20:10:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
22 of 23 (95.65%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
sectoprat
Score:
  10/10
Tags:
family:redline family:sectoprat botnet:exodus discovery infostealer rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Looks up external IP address via web service
Reads user/profile data of web browsers
RedLine
RedLine payload
SectopRAT
SectopRAT payload
Malware Config
C2 Extraction:
91.92.251.179:1334
Unpacked files
SH256 hash:
c1a7adbef8fb6d94955cbae7dd0dd5c2778eb4cb45e56b73ccc772274bcb55da
MD5 hash:
56d53a0986c4e98b6d20e5e9fcace67b
SHA1 hash:
8bbef96ff7a44ff9aba4a88fda35fc523ef28d9b
Detections:
MALWARE_Win_RedLine INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs RedLine_a
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_Redline_Stealer_V2
Author:Varp0s
Rule name:INDICATOR_SUSPICIOUS_Binary_Embedded_Crypto_Wallet_Browser_Extension_IDs
Author:ditekSHen
Description:Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:Mal_InfoStealer_Win32_RedLine_Unobfuscated_2021
Author:BlackBerry Threat Research Team
Description:Detects Unobfuscated RedLine Infostealer Executables (.NET)
Rule name:NET
Author:malware-lu
Rule name:pe_imphash
Rule name:RedLine_a
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Windows_Trojan_RedLineStealer_15ee6903
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_4df4bcb6
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_f07b3cb4
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_f54632eb
Author:Elastic Security
Rule name:win_delivery_check_g0

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments