MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cac59279f0105fd7c477abf07944c910a02735517efc7e4d10ae0669c336daeb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: cac59279f0105fd7c477abf07944c910a02735517efc7e4d10ae0669c336daeb
SHA3-384 hash: bafff95430ae108cfd920e665b8fcb7e844c2f5598322183ee4376046e0de37b2834dd13976fd70ae570b4f0dd7d9bcd
SHA1 hash: 2ba6e585d17ec5269e3e355ac02523641a0e4753
MD5 hash: 97d4e061da8fb2c54c8dca5c671017fc
humanhash: mirror-aspen-gee-beryllium
File name:SecuriteInfo.com.Win32.PWSX-gen.7503
Download: download sample
Signature RedLineStealer
File size:7'832'576 bytes
First seen:2022-09-21 23:21:57 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 2557b21b8e913903bc66159999899c81 (12 x RedLineStealer, 1 x ArkeiStealer)
ssdeep 196608:YHBRwtPCCvKBQgTvy1ad3yDSwID4AYwGF8SQdlPzdRKjdB1dFT6PiN5sflKiJY6B:VIO5yp5N
TLSH T1AA86521F6D6155FCC4A85AE540DF273F4260421E1A2CAF8E8A1C5FBB86B534AF71A10F
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
308
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Win32.PWSX-gen.7503
Verdict:
Suspicious activity
Analysis date:
2022-09-21 23:27:12 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Unauthorized injection to a recently created process
Creating a file
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Running batch commands
Creating a process from a recently created file
DNS request
Creating a file in the %temp% directory
Creating a window
Launching a process
Query of malicious DNS domain
Sending a TCP request to an infection source
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
CryptOne, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected VMProtect packer
Drops PE files with benign system names
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected CryptOne packer
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 707460 Sample: SecuriteInfo.com.Win32.PWSX... Startdate: 22/09/2022 Architecture: WINDOWS Score: 100 99 Malicious sample detected (through community Yara rule) 2->99 101 Antivirus detection for dropped file 2->101 103 Multi AV Scanner detection for dropped file 2->103 105 9 other signatures 2->105 9 SecuriteInfo.com.Win32.PWSX-gen.7503.exe 2 2->9         started        13 dllhost.exe 2->13         started        15 dllhost.exe 2->15         started        17 2 other processes 2->17 process3 file4 75 SecuriteInfo.com.W...SX-gen.7503.exe.log, ASCII 9->75 dropped 131 Creates HTML files with .exe extension (expired dropper behavior) 9->131 133 Contains functionality to inject code into remote processes 9->133 135 Drops PE files with benign system names 9->135 19 SecuriteInfo.com.Win32.PWSX-gen.7503.exe 2 11 9->19         started        24 conhost.exe 9->24         started        137 Multi AV Scanner detection for dropped file 13->137 139 Machine Learning detection for dropped file 13->139 141 Injects a PE file into a foreign processes 13->141 26 conhost.exe 13->26         started        28 dllhost.exe 13->28         started        30 conhost.exe 15->30         started        32 dllhost.exe 15->32         started        34 WerFault.exe 10 17->34         started        36 WerFault.exe 10 17->36         started        signatures5 process6 dnsIp7 89 pgtsouq.com 192.185.138.140, 49708, 49711, 49712 UNIFIEDLAYER-AS-1US United States 19->89 91 94.26.226.51, 49700, 80 PTC-YEMENNETYE Russian Federation 19->91 93 blackhk1.beget.tech 5.101.153.227, 49701, 49704, 49705 BEGET-ASRU Russian Federation 19->93 65 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32+ 19->65 dropped 67 C:\Users\user\AppData\...\explorer.exe, PE32+ 19->67 dropped 69 C:\Users\user\AppData\...\DKCC243A7BF3HM6.exe, PE32 19->69 dropped 71 4 other malicious files 19->71 dropped 115 Creates multiple autostart registry keys 19->115 38 1K59G3BE31BB7C8.exe 2 19->38         started        41 CI9C671GCCFL36L.exe 19->41         started        43 DKCC243A7BF3HM6.exe 2 19->43         started        45 3 other processes 19->45 file8 signatures9 process10 dnsIp11 117 Multi AV Scanner detection for dropped file 38->117 119 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 38->119 121 Machine Learning detection for dropped file 38->121 123 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 38->123 49 1K59G3BE31BB7C8.exe 4 38->49         started        125 Injects a PE file into a foreign processes 41->125 53 CI9C671GCCFL36L.exe 41->53         started        56 DKCC243A7BF3HM6.exe 43->56         started        95 iplogger.org 148.251.234.83 HETZNER-ASDE Germany 45->95 77 C:\Users\user\AppData\Local\...\9S4gBYT.s~v, PE32 45->77 dropped 127 Antivirus detection for dropped file 45->127 129 May check the online IP address of the machine 45->129 58 explorer.exe 45->58         started        60 regsvr32.exe 45->60         started        file12 signatures13 process14 dnsIp15 79 185.215.113.122 WHOLESALECONNECTIONSNL Portugal 49->79 107 Tries to harvest and steal browser information (history, passwords, etc) 49->107 109 Tries to steal Crypto Currency Wallets 49->109 81 passport.yandex.ru 213.180.204.24 YANDEXRU Russian Federation 53->81 83 yandex.ru 5.255.255.70 YANDEXRU Russian Federation 53->83 87 2 other IPs or domains 53->87 73 C:\Users\user\AppData\Roaming\...\dllhost.exe, PE32 53->73 dropped 111 Creates multiple autostart registry keys 53->111 85 185.215.113.216 WHOLESALECONNECTIONSNL Portugal 56->85 113 Multi AV Scanner detection for dropped file 58->113 62 WerFault.exe 20 9 58->62         started        file16 signatures17 process18 dnsIp19 97 192.168.2.1 unknown unknown 62->97
Threat name:
ByteCode-MSIL.Spyware.RedLine
Status:
Malicious
First seen:
2022-09-21 22:58:07 UTC
File Type:
PE (.Net Exe)
Extracted files:
5
AV detection:
23 of 26 (88.46%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:lyla3.18.9 botnet:sep16as1 discovery infostealer miner persistence spyware stealer vmprotect
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Detectes Phoenix Miner Payload
RedLine
RedLine payload
Malware Config
C2 Extraction:
185.215.113.122:15386
185.215.113.216:21921
Unpacked files
SH256 hash:
179a2888d029db15c0d07ae1ad11ce237c0912fa975235bbac07087674884db2
MD5 hash:
6a08b034d3759c98a2ead16e880d3c66
SHA1 hash:
bc2e01fe4bc22d9ad7364022afae42997737a6ee
SH256 hash:
cac59279f0105fd7c477abf07944c910a02735517efc7e4d10ae0669c336daeb
MD5 hash:
97d4e061da8fb2c54c8dca5c671017fc
SHA1 hash:
2ba6e585d17ec5269e3e355ac02523641a0e4753
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe cac59279f0105fd7c477abf07944c910a02735517efc7e4d10ae0669c336daeb

(this sample)

  
Delivery method
Distributed via web download

Comments