MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cd49dffaaeb0970d0b772276ca7bd006dc454ec76fae4573460b967ba548d1a9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: cd49dffaaeb0970d0b772276ca7bd006dc454ec76fae4573460b967ba548d1a9
SHA3-384 hash: 8ea2657da6e7d482265d8f82bbde28c5778c67f930f2a98878512a4bef59b0c02773d2b3047656518e680d2637e30325
SHA1 hash: 8b5ee51cc6f2c258c0a9a4088bd2a182d9a4a804
MD5 hash: 077df388f71e4292f9fa9553c7560633
humanhash: charlie-freddie-uniform-double
File name:cd49dffaaeb0970d0b772276ca7bd006dc454ec76fae4573460b967ba548d1a9
Download: download sample
Signature RedLineStealer
File size:897'536 bytes
First seen:2023-05-14 18:32:34 UTC
Last seen:2023-05-14 18:46:31 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 12288:vMr0y90pljJCASVaPMxfsKfrcqpYzK+jAOVXLfiDhQ4jgwUX:XyQjJIlDcPzKiPLO7aX
TLSH T1B2152212E3D84073ECF72BB01CFE02C71639BDD2697C925B2780AD1A0DB26949676767
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter JaffaCakes118
Tags:RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
52
Origin country :
GB GB
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
cd49dffaaeb0970d0b772276ca7bd006dc454ec76fae4573460b967ba548d1a9
Verdict:
Malicious activity
Analysis date:
2023-05-14 18:59:31 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Creating a window
Unauthorized injection to a recently created process
Sending a TCP request to an infection source
Stealing user critical data
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
advpack.dll amadey CAB comodo confuserex installer packed packed rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 866305 Sample: tMzUwPkWMV.exe Startdate: 15/05/2023 Architecture: WINDOWS Score: 100 45 Snort IDS alert for network traffic 2->45 47 Found malware configuration 2->47 49 Malicious sample detected (through community Yara rule) 2->49 51 12 other signatures 2->51 8 tMzUwPkWMV.exe 1 4 2->8         started        11 rundll32.exe 2->11         started        13 rundll32.exe 2->13         started        15 rundll32.exe 2->15         started        process3 file4 39 C:\Users\user\AppData\Local\...\x8321854.exe, PE32 8->39 dropped 41 C:\Users\user\AppData\Local\...\i5974087.exe, PE32 8->41 dropped 17 x8321854.exe 1 4 8->17         started        process5 file6 31 C:\Users\user\AppData\Local\...\x5470922.exe, PE32 17->31 dropped 33 C:\Users\user\AppData\Local\...\h5608874.exe, PE32 17->33 dropped 53 Antivirus detection for dropped file 17->53 55 Multi AV Scanner detection for dropped file 17->55 57 Machine Learning detection for dropped file 17->57 21 x5470922.exe 1 4 17->21         started        signatures7 process8 file9 35 C:\Users\user\AppData\Local\...\g3351374.exe, PE32 21->35 dropped 37 C:\Users\user\AppData\Local\...\f4885347.exe, PE32 21->37 dropped 59 Antivirus detection for dropped file 21->59 61 Multi AV Scanner detection for dropped file 21->61 63 Machine Learning detection for dropped file 21->63 25 f4885347.exe 4 21->25         started        29 g3351374.exe 9 1 21->29         started        signatures10 process11 dnsIp12 43 185.161.248.75, 4132, 49694 NTLGB United Kingdom 25->43 65 Antivirus detection for dropped file 25->65 67 Multi AV Scanner detection for dropped file 25->67 69 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->69 77 2 other signatures 25->77 71 Machine Learning detection for dropped file 29->71 73 Disable Windows Defender notifications (registry) 29->73 75 Disable Windows Defender real time protection (registry) 29->75 signatures13
Threat name:
ByteCode-MSIL.Trojan.RedLineStealer
Status:
Malicious
First seen:
2023-05-14 18:34:20 UTC
File Type:
PE (Exe)
Extracted files:
116
AV detection:
19 of 24 (79.17%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:dimas botnet:roza discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Modifies Windows Defender Real-time Protection settings
RedLine
Malware Config
C2 Extraction:
185.161.248.75:4132
Unpacked files
SH256 hash:
5db6dd2a985e27530141b14fa435a7f815acbfdab988a456504413eb4e54feb5
MD5 hash:
4ed7c9048660ff646dc6892bb7602a27
SHA1 hash:
b74c40ee87eda33836ba0f45919fc43e89454394
SH256 hash:
eb7e2063450f3e234c47f18f2b005ee9537c79ee30ecec57c9c960c49466222f
MD5 hash:
18d01903826a09f72ec66338ef78aaed
SHA1 hash:
0bd799d068c5029c28bf2d9bc4f8b78038741b9b
Detections:
Amadey
Parent samples :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 hash:
caa8b6bd5b069b1bc58f1022366d9ec2ac0d24bc8fc44887924573f64059c156
MD5 hash:
65207bdb9f32bb06bc0070143b2c2ad2
SHA1 hash:
b1c9d8a56c5bcda0782c46b6235fab2b4d4fc694
SH256 hash:
cd49dffaaeb0970d0b772276ca7bd006dc454ec76fae4573460b967ba548d1a9
MD5 hash:
077df388f71e4292f9fa9553c7560633
SHA1 hash:
8b5ee51cc6f2c258c0a9a4088bd2a182d9a4a804
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments