MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c8c685962497719668e4755f90ec88274dc6091379b6c6c8bebff3ad3c089672. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 2 File information Comments

SHA256 hash: c8c685962497719668e4755f90ec88274dc6091379b6c6c8bebff3ad3c089672
SHA3-384 hash: 9f1f215a52fa213ab0b79512657615edea0915cf21d6411c30a6952d909266441acdfe0bd4785cd3a460b69a4ac3d293
SHA1 hash: 4a0c8c188217da15ec37859e09f9ac8ad483faff
MD5 hash: 83d48ceb05204219598796cf99ade13c
humanhash: floor-lake-friend-mobile
File name:mosoxxxHack.exe
Download: download sample
Signature RedLineStealer
File size:2'674'196 bytes
First seen:2021-08-20 14:48:38 UTC
Last seen:2021-08-20 16:12:16 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5cdfba68edbb115e7aa5ed6776bb6546 (29 x RedLineStealer, 1 x MassLogger)
ssdeep 49152:p+tubxM5jdJgJ3d/aFXFn6tFYBMf5ObHiMlCqJ69tPwNhOdC1lTZDkU80:pBbO5jdeJ3IF16tFYBMfCvCw63PwDZ1v
Threatray 4'224 similar samples on MalwareBazaar
TLSH T1BEC5124E2812EEDCFBC04A334787F10465B5AF24EBABEECD689537C95A70A905F121D1
dhash icon 31f0f0f0f0f0f031 (5 x RedLineStealer, 1 x LummaStealer)
Reporter Anonymous
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
134
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
mosoxxxHack.exe
Verdict:
Malicious activity
Analysis date:
2021-08-20 14:49:56 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Searching for analyzing tools
Searching for the window
Connection attempt
Sending an HTTP POST request
DNS request
Sending a custom TCP request
Creating a window
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a process from a recently created file
Creating a file
Creating a process with a hidden window
Stealing user critical data
Unauthorized injection to a recently created process
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 468922 Sample: mosoxxxHack.exe Startdate: 20/08/2021 Architecture: WINDOWS Score: 100 60 redteamminepool.ug 2->60 76 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->76 78 Antivirus detection for dropped file 2->78 80 Antivirus / Scanner detection for submitted sample 2->80 82 15 other signatures 2->82 11 mosoxxxHack.exe 15 34 2->11         started        signatures3 process4 dnsIp5 62 91.142.79.35, 13400, 49706, 49711 VTSL1-ASRU Russian Federation 11->62 64 cdn.discordapp.com 162.159.135.233, 443, 49713, 49722 CLOUDFLARENETUS United States 11->64 66 api.ip.sb 11->66 52 C:\Users\user\AppData\Local\Temp\a.exe, PE32 11->52 dropped 54 C:\Users\user\AppData\...\mosoxxxHack.exe.log, ASCII 11->54 dropped 92 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->92 94 Query firmware table information (likely to detect VMs) 11->94 96 Tries to detect sandboxes and other dynamic analysis tools (window names) 11->96 98 5 other signatures 11->98 16 a.exe 4 11->16         started        20 conhost.exe 11->20         started        file6 signatures7 process8 file9 40 C:\Users\user\AppData\Local\...\a.exe.log, ASCII 16->40 dropped 68 Multi AV Scanner detection for dropped file 16->68 70 Machine Learning detection for dropped file 16->70 72 Contains functionality to inject code into remote processes 16->72 74 2 other signatures 16->74 22 a.exe 4 16->22         started        25 powershell.exe 14 16->25         started        signatures10 process11 file12 50 C:\Users\user\AppData\Local\...\drbux.exe, PE32 22->50 dropped 27 drbux.exe 4 22->27         started        30 conhost.exe 25->30         started        process13 signatures14 84 Multi AV Scanner detection for dropped file 27->84 86 Machine Learning detection for dropped file 27->86 88 Uses schtasks.exe or at.exe to add and modify task schedules 27->88 90 2 other signatures 27->90 32 drbux.exe 27->32         started        36 powershell.exe 27->36         started        process15 dnsIp16 56 x-vpn.ug 109.234.32.63, 49720, 49721, 49724 VDSINA-ASRU Russian Federation 32->56 58 cdn.discordapp.com 32->58 42 C:\Users\user\AppData\Local\Temp\clp.exe, PE32 32->42 dropped 44 C:\Users\user\AppData\Local\...\cred[1].dll, PE32 32->44 dropped 46 C:\Users\user\AppData\Local\...\clp[1].exe, PE32 32->46 dropped 48 C:\ProgramData\ca82a716069a53\cred.dll, PE32 32->48 dropped 38 conhost.exe 36->38         started        file17 process18
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2021-08-20 14:49:10 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:544363603 discovery evasion infostealer spyware stealer themida trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Reads user/profile data of web browsers
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RedLine
RedLine Payload
Malware Config
C2 Extraction:
91.142.79.35:13400
Unpacked files
SH256 hash:
da3227f940d40ce8b0ada53aac9d44579845209816713ade149e1666d29e5361
MD5 hash:
1507c210e4d34f558491aa97132bb109
SHA1 hash:
7856fba073018c9c835fdaba1d2d5000cd42fc46
SH256 hash:
3fcae912235a3a6dcac28fd5ffe8cecc17c3556daf42cda74182f6e8774b33ff
MD5 hash:
be26ac03630e332897982968420eae32
SHA1 hash:
36ea204b8c04c88d36861b0d38c9b4b0fe6a1760
SH256 hash:
309fbadf9dd684a6fa1a69cf6e6eb69f029914cc11fb58ea8b9881efe55a8433
MD5 hash:
9a52f6b278da12d6b4e5b7a3ef081cca
SHA1 hash:
7c8f62292221caaa0e472708f7f49058571ccf6f
SH256 hash:
c8c685962497719668e4755f90ec88274dc6091379b6c6c8bebff3ad3c089672
MD5 hash:
83d48ceb05204219598796cf99ade13c
SHA1 hash:
4a0c8c188217da15ec37859e09f9ac8ad483faff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments