MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 21 File information Comments

SHA256 hash: c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71
SHA3-384 hash: 0c9e597c8ecf4e63bec11d207b6698b6422e2000ab008134a9706cde446db8f33a9eaff5c0fde364c301e49af6d95bab
SHA1 hash: 0acb3c5b6a6bd568656c7dc9f2bebaf0ea01207a
MD5 hash: c313d79bb52d3dc1a0fdd298a6c47810
humanhash: south-september-red-illinois
File name:Bypasss.exe
Download: download sample
Signature RedLineStealer
File size:2'947'209 bytes
First seen:2024-06-03 10:30:55 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 00be6e6c4f9e287672c8301b72bdabf3 (116 x RedLineStealer, 70 x AsyncRAT, 55 x AgentTesla)
ssdeep 49152:VIf2lo986T2njmZHDIkduvYcg9/YyCBGQPDK2z3fANo7+VnAeRq8HBaegPzcxCnG:VIKdiZvdPf2DGQ7L3gR7HBaegPzcxCnG
Threatray 857 similar samples on MalwareBazaar
TLSH T1FDD53312EEC58072E43235314625979575BE7A20BF1C9FAEB7E41E7DF8B10E062349A3
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4504/4/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter tcains1
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
403
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Bypasss.exe
Verdict:
Malicious activity
Analysis date:
2024-06-03 10:28:09 UTC
Tags:
stealer meta metastealer redline exfiltration

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
Banker Encryption Execution Generic Network Other Static Stealth Dexter
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %AppData% directory
Creating a process from a recently created file
Using the Windows Management Instrumentation requests
Creating a file
Deleting a system file
Running batch commands
Launching a process
Reading critical registry keys
Creating a file in the %temp% directory
Creating a service
Launching a service
Unauthorized injection to a recently created process
Connection attempt to an infection source
Sending a TCP request to an infection source
Stealing user critical data
Enabling autorun for a service
Adding an exclusion to Microsoft Defender
Forced shutdown of a browser
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug coinminer epmicrosoft_visual_cc fingerprint installer lolbin microsoft_visual_cc miner overlay packed redline setupapi sfx shdocvw shell32 zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Changes security center settings (notifications, updates, antivirus, firewall)
Contains functionality to capture screen (.Net source)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Reads the System eventlog
Sigma detected: Disable power options
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Stop EventLog
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1450972 Sample: Bypasss.exe Startdate: 03/06/2024 Architecture: WINDOWS Score: 100 71 time.windows.com 2->71 73 Multi AV Scanner detection for submitted file 2->73 75 Sigma detected: Stop EventLog 2->75 77 Sigma detected: Disable power options 2->77 79 6 other signatures 2->79 9 Bypasss.exe 9 2->9         started        12 svchost.exe 2->12         started        15 svchost.exe 1 2->15         started        17 9 other processes 2->17 signatures3 process4 dnsIp5 63 C:\Users\user\AppData\Roaming\svhost.exe, PE32 9->63 dropped 65 C:\Users\user\AppData\Roaming\4.EXE, PE32 9->65 dropped 67 C:\Users\user\AppData\Roaming\123.exe, PE32+ 9->67 dropped 20 123.exe 1 2 9->20         started        24 4.EXE 4 9->24         started        26 svhost.exe 1 9->26         started        97 Changes security center settings (notifications, updates, antivirus, firewall) 12->97 28 MpCmdRun.exe 12->28         started        99 Query firmware table information (likely to detect VMs) 15->99 69 127.0.0.1 unknown unknown 17->69 101 Multi AV Scanner detection for dropped file 17->101 file6 signatures7 process8 file9 61 C:\ProgramData\...\gfqyepapamry.exe, PE32+ 20->61 dropped 81 Multi AV Scanner detection for dropped file 20->81 83 Uses powercfg.exe to modify the power settings 20->83 85 Adds a directory exclusion to Windows Defender 20->85 87 Modifies power options to not sleep / hibernate 20->87 30 powershell.exe 23 20->30         started        33 cmd.exe 20->33         started        35 sc.exe 20->35         started        41 12 other processes 20->41 89 Machine Learning detection for dropped file 24->89 91 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 24->91 93 Reads the System eventlog 24->93 37 conhost.exe 24->37         started        95 Queries memory information (via WMI often done to detect virtual machines) 26->95 39 conhost.exe 28->39         started        signatures10 process11 signatures12 103 Loading BitLocker PowerShell Module 30->103 43 WmiPrvSE.exe 30->43         started        45 conhost.exe 30->45         started        47 conhost.exe 33->47         started        49 wusa.exe 33->49         started        51 conhost.exe 35->51         started        53 conhost.exe 41->53         started        55 conhost.exe 41->55         started        57 conhost.exe 41->57         started        59 9 other processes 41->59 process13
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2024-06-03 10:31:06 UTC
File Type:
PE (Exe)
Extracted files:
40
AV detection:
20 of 24 (83.33%)
Threat level:
  2/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig discovery evasion execution miner persistence spyware stealer upx
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Command and Scripting Interpreter: PowerShell
Creates new service(s)
Stops running service(s)
XMRig Miner payload
xmrig
Unpacked files
SH256 hash:
db091594298ec199b807155ec5a7341f9cb0f6aca1aad7e4c1b92e2eb71ab759
MD5 hash:
ec18c8aabdc436a604172282b8be2ab3
SHA1 hash:
f68446502c5c2cddefe7c5511256c24881f4a842
SH256 hash:
ce51ed0339a350243bc1576fcfa76e1b589908055f24123c9816f0dc8bf8c22a
MD5 hash:
90212c985d978d490e394a941976c5ee
SHA1 hash:
31f546d1390e53760515482ecd719b6b008aca91
SH256 hash:
52c8c92f79183a354c5ee59653426b0f97209c37eec39fe5077ef43666eaf8a1
MD5 hash:
b0601c9443dd3b7a6b02ee764791c9ad
SHA1 hash:
8ed01f29022ce752408bae7ff961edc06872413a
SH256 hash:
c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71
MD5 hash:
c313d79bb52d3dc1a0fdd298a6c47810
SHA1 hash:
0acb3c5b6a6bd568656c7dc9f2bebaf0ea01207a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerCheck__QueryInfo
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:ldpreload
Author:xorseed
Reference:https://stuff.rop.io/
Rule name:MacOS_Cryptominer_Xmrig_241780a1
Author:Elastic Security
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_CoinMiner02
Author:ditekSHen
Description:Detects coinmining malware
Rule name:MAL_XMR_Miner_May19_1
Author:Florian Roth (Nextron Systems)
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MAL_XMR_Miner_May19_1_RID2E1B
Author:Florian Roth
Description:Detects Monero Crypto Coin Miner
Reference:https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Mimikatz_Generic
Author:Still
Description:attempts to match all variants of Mimikatz
Rule name:rig_win64_xmrig_6_13_1_xmrig
Author:yarGen Rule Generator
Description:rig_win64 - file xmrig.exe
Reference:https://github.com/Neo23x0/yarGen
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SEH__vectored
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:XMRIG_Monero_Miner
Author:Florian Roth (Nextron Systems)
Description:Detects Monero mining software
Reference:https://github.com/xmrig/xmrig/releases

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe c54eb244078dcaf2472c85bcce337b152dc24154d6a03004a29e4f4069d49d71

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
GDI_PLUS_APIInterfaces with Graphicsgdiplus.dll::GdiplusStartup
gdiplus.dll::GdiplusShutdown
gdiplus.dll::GdipAlloc
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CloseHandle
KERNEL32.dll::CreateThread
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::LoadLibraryExA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetSystemInfo
KERNEL32.dll::GetStartupInfoW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::AllocConsole
KERNEL32.dll::AttachConsole
KERNEL32.dll::WriteConsoleW
KERNEL32.dll::FreeConsole
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
KERNEL32.dll::CreateFileW
KERNEL32.dll::CreateFileMappingW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::MoveFileW
KERNEL32.dll::MoveFileExW

Comments