MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c49ee29ddda7e9ed00bb30ddb9a63fdd4c84668cfb05f1e3a8df6d9604e906f4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: c49ee29ddda7e9ed00bb30ddb9a63fdd4c84668cfb05f1e3a8df6d9604e906f4
SHA3-384 hash: 3cd6b72d277ec867465b2e4fbcd1dd6a76210efd5f312be90742e00ea02412a09129a1473de1db8619bcdcb6a36b5b72
SHA1 hash: d1321653958003053f45f278643806a3396824d5
MD5 hash: 66c3463fe29401bfc0fc89724ddd99bb
humanhash: hawaii-papa-solar-moon
File name:66c3463fe29401bfc0fc89724ddd99bb.exe
Download: download sample
Signature RedLineStealer
File size:400'896 bytes
First seen:2021-11-08 10:25:54 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash d65fd1d21865226dce1f880ff10ff6f8 (9 x RedLineStealer)
ssdeep 6144:NCAWRv849Yswsd8JbHJ01eKbh+O2Kx5CWPtpJB7uzbgwu6L7ITsqSigaTwVf:oAWRvPHDd6recWh1jZlp7unnn7s
Threatray 3'584 similar samples on MalwareBazaar
TLSH T15584DFF162B88875D1936E3048628AE45A7BFC41D960610AF670B7AE1EB3FCC45F531E
File icon (PE):PE icon
dhash icon fcfcb4d4d4d4d8c0 (70 x RedLineStealer, 59 x RaccoonStealer, 24 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
185.215.113.29:1102

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
185.215.113.29:1102 https://threatfox.abuse.ch/ioc/244872/

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
84 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Krypter
Status:
Malicious
First seen:
2021-11-08 10:26:04 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:sewpalpadin discovery infostealer spyware stealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.29:1102
Unpacked files
SH256 hash:
4f945b3df6be970ecde7cbab5f7cc47f47f71513b41c2e5f7dd9a6a1bacc74cf
MD5 hash:
7b95f76574d40932b2bff122f425bdf0
SHA1 hash:
d9ac7784a6b5a2d92ae7e55f2d07ea0b7353ea45
SH256 hash:
67a214ca514a123b181d0578b3b5563458ff0cf72c37345ccc361be33fe8ab35
MD5 hash:
953de33962656db478be2b12101018d4
SHA1 hash:
c1b168c3286cf1ee6ba06c2684e55e43aacc43f0
SH256 hash:
bfa7d2965044aa9b9badef2693dc6f7400952d4b00f506445463b9a5479acc99
MD5 hash:
4f5bba39068f1963fe555c8ce5e1647b
SHA1 hash:
38d5ba55954ca815776c049aa64d4a702a9fdc5f
SH256 hash:
c49ee29ddda7e9ed00bb30ddb9a63fdd4c84668cfb05f1e3a8df6d9604e906f4
MD5 hash:
66c3463fe29401bfc0fc89724ddd99bb
SHA1 hash:
d1321653958003053f45f278643806a3396824d5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe c49ee29ddda7e9ed00bb30ddb9a63fdd4c84668cfb05f1e3a8df6d9604e906f4

(this sample)

  
Delivery method
Distributed via web download

Comments