MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cc973eb98def4aca2608cc493b2c5477d9049d6b316f482d8487b4394a1df90d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 10
| SHA256 hash: | cc973eb98def4aca2608cc493b2c5477d9049d6b316f482d8487b4394a1df90d |
|---|---|
| SHA3-384 hash: | ea3be3bd9bd4f6d8a5a36ff723a5b7ede002ffda5e7714d1e997f0d7802007b1b18ccb786069e0eb7651dbf664056f19 |
| SHA1 hash: | 433abf4d5cffd2c1594ad4b1d638249a7c35ebc0 |
| MD5 hash: | b25499e349a9fbb46c08b7dca1c1f882 |
| humanhash: | emma-november-bacon-crazy |
| File name: | b25499e349a9fbb46c08b7dca1c1f882.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 6'108'870 bytes |
| First seen: | 2021-12-22 10:21:59 UTC |
| Last seen: | 2021-12-22 12:27:41 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | eb5bc6ff6263b364dfbfb78bdb48ed59 (55 x Adware.Generic, 18 x RaccoonStealer, 8 x Adware.ExtenBro) |
| ssdeep | 98304:iX4eQmPZcoZGujZVzSqxiwi5tQa9BxU8JcX16xP0bBb55cGCyTLGJANFI2:4FqoZGuNdSqswe9nvUEP0NCamD2 |
| Threatray | 29 similar samples on MalwareBazaar |
| TLSH | T1F9561227B268A13EC45923354573B5105CFBB7ACF412BE1266E4CC8DCFA64C01EFAA65 |
| File icon (PE): | |
| dhash icon | 3271d4b6b6d47132 (11 x RedLineStealer, 2 x Adware.Generic, 2 x LummaStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 80.89.228.129:80 | https://threatfox.abuse.ch/ioc/281658/ |
Intelligence
File Origin
# of uploads :
2
# of downloads :
182
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
b25499e349a9fbb46c08b7dca1c1f882.exe
Verdict:
Suspicious activity
Analysis date:
2021-12-22 10:23:14 UTC
Tags:
installer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Detection(s):
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Moving a file to the %temp% subdirectory
Creating a file
Moving a recently created file
Running batch commands
Creating a process with a hidden window
Launching a process
DNS request
Transferring files using the Background Intelligent Transfer Service (BITS)
Connecting to a non-recommended domain
Sending an HTTP GET request
Enabling the 'hidden' option for files in the %temp% directory
Enabling the 'hidden' option for recently created files
Downloading the file
Enabling autorun by creating a file
Result
Malware family:
n/a
Score:
6/10
Tags:
n/a
Behaviour
MalwareBazaar
CheckNumberOfProcessor
CheckCmdLine
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
overlay packed wacatac
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Suspicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
50 / 100
Signature
.NET source code references suspicious native API functions
Creates a thread in another existing process (thread injection)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has a writeable .text section
Sigma detected: WScript or CScript Dropper
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Tries to download files via bitsadmin
Uses 7zip to decompress a password protected archive
Uses cmd line tools excessively to alter registry or file data
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
Threat name:
Win32.Downloader.Bitser
Status:
Malicious
First seen:
2021-12-17 11:08:16 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
17 of 28 (60.71%)
Threat level:
3/5
Detection(s):
Malicious file
Verdict:
unknown
Similar samples:
+ 19 additional samples on MalwareBazaar
Result
Malware family:
redline
Score:
10/10
Tags:
family:redline botnet:main discovery evasion infostealer persistence ransomware spyware stealer trojan
Behaviour
Creates scheduled task(s)
Delays execution with timeout.exe
Download via BitsAdmin
Enumerates system info in registry
Interacts with shadow copies
Modifies data under HKEY_USERS
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Drops file in Windows directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Deletes shadow copies
Modifies Windows Defender Real-time Protection settings
Modifies Windows Defender notification settings
Modifies security service
RedLine
RedLine Payload
Malware Config
C2 Extraction:
80.89.228.129:80
Dropper Extraction:
http://oniondq7shlx5o67t64ljuzisyp34s3n7vepnhc5ijt5hjh1001.biz/hfile.bin
Unpacked files
SH256 hash:
44b8e6a310564338968158a1ed88c8535dece20acb06c5e22d87953c261dfed0
MD5 hash:
9c8886759e736d3f27674e0fff63d40a
SHA1 hash:
ceff6a7b106c3262d9e8496d2ab319821b100541
SH256 hash:
395c370b426a2cf427b1a8ca700ff64c82c971ca0585b5350974102aa5f68429
MD5 hash:
3366fa560a3db2e620ab92148a737dc8
SHA1 hash:
c12a57e152001316d443912daaecbf706a0ae710
SH256 hash:
42fa16c9d9014e26858fe9b4cb3d36c375375560e2f6a3bfea0b33710f89f261
MD5 hash:
a715eb7da02e9a35954c337f1af4357e
SHA1 hash:
f5685d72a12308f5ad0874ed6b068148b886ae40
SH256 hash:
dfe25e9c801f828df9fb5e3baee41651ba72c1e00634be4b648d72f1ad8599e7
MD5 hash:
559ec2666c1b2a509aebf1cfd182add8
SHA1 hash:
d9fe1a0fc77eee967de02606f87c5a8c5c6d7729
SH256 hash:
1b703b0545b27c23921b3953f10acdb943db25a406d110d4f50120e5a6553d58
MD5 hash:
8c023fe5726daf6a14e6ec963d8a10a7
SHA1 hash:
d92ac2d1abd8f6a9379c0ab6fd6b3c38ff7906b9
SH256 hash:
55a7b6e88f03528c8cdcc4cfff9a7e5efce3c9d3d21023ef2b37aa228b530ddc
MD5 hash:
850d12295447dbcd9e38a073aef72fb6
SHA1 hash:
bb8e998ed8b2e07d5ffec82509019df134468643
SH256 hash:
a9c78e25952d72a1d27975cefcfe30c61b36e2dfc5057b810f037ea02b4a3d57
MD5 hash:
dd08ed5839252d79e27a3712f3f1536b
SHA1 hash:
b5b899f064b5e940779402c38e9ced82e9f84c2e
SH256 hash:
53d3b08f6b3a2cbbfdfd763e3efafd7acf33e641d73ea2d65dd6950aa7d5f72b
MD5 hash:
e1ba35dc85f8e5443d783a0336f7b51f
SHA1 hash:
996b13f8330f02fc1fca92577bee65efa7b85677
SH256 hash:
89b5030a8272a67ce36b279273da26c8e0495b89f9499dfe9a249e6105efaa77
MD5 hash:
56f55ac335d7b1ea6049c89ef20b2ba0
SHA1 hash:
6df8932e6e91fff7b7e053c2ffb1c4a2b49fdef1
SH256 hash:
e60d85e3225aad5397513fb3a1247da025c0602e233587c1193258dae92ead68
MD5 hash:
b41745d1c49c1b5327ad465151649793
SHA1 hash:
56035a9c146858082bb52aeb20d44e7e55dc18d1
SH256 hash:
70d3d71a330c2695fbc32e6748fa0fd7efc0d4d8ddf0d14e89fd8d38159e07ec
MD5 hash:
74c930c33f869a38cfe622769ac53b27
SHA1 hash:
51c39ca6392bc160aefcb4ff748dedc8579918b6
SH256 hash:
e3b69cb62d2be0dd4a7cc8c7b3de17adf50aea4e4ad0a8d05c1d2a5c6bdad47a
MD5 hash:
0b9d6249615b5fe89a9f2c3add205992
SHA1 hash:
449ef8652d6a43a2ed649f095d974679f7351bac
SH256 hash:
697a836b03239308249ff2dcaa2d63c902cfc4d6ec855cbb9cfdad73ccbcb91e
MD5 hash:
c3a5675dd7cf3b4129aefc91205f196a
SHA1 hash:
40737a09f09efaf964fd19abd6966a6c047abaeb
SH256 hash:
910210de1f1629ef9eb90af95fce0a0dbcdb9b255bcd0890ba5d08e55de932fb
MD5 hash:
d5bcac04f2a7a2e8f25650629164aca8
SHA1 hash:
2585a7f2b3908a27947f0966f5095720306a9d58
SH256 hash:
b669598850a71512e53e457d9b71380a8fba5c0d58c84ce3d69f053d304123e5
MD5 hash:
2c6629ade116e68be67893810f118187
SHA1 hash:
8528ac9af14246e951729fc47f82a7482f7f7322
SH256 hash:
e44efec2e0f1ea927cc9477e1fa599895d4107f0ea5643732f0ecbc5458188a4
MD5 hash:
c8ce12a7d0ab103b963f49bd83b68b7c
SHA1 hash:
61295bb6bbdbb9b11a70428cea205ca4dc599f8c
SH256 hash:
81dffb13a3d6b12af9fe87d64cc0b6211414d79bdb456d2ef6afef791436bba2
MD5 hash:
37275a5375572f7fb32b522b1323328d
SHA1 hash:
1be3a5dd5e0d8ac191c2a559cc630324e63e77a5
SH256 hash:
cc973eb98def4aca2608cc493b2c5477d9049d6b316f482d8487b4394a1df90d
MD5 hash:
b25499e349a9fbb46c08b7dca1c1f882
SHA1 hash:
433abf4d5cffd2c1594ad4b1d638249a7c35ebc0
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.