MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cda52f00a112c4001850f2659fcc0fd1eba55cc3375a4ca34f4de031f13ab5b8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 4 File information Comments

SHA256 hash: cda52f00a112c4001850f2659fcc0fd1eba55cc3375a4ca34f4de031f13ab5b8
SHA3-384 hash: 8e196674c865b0fd1c21e5283e91b3da832fd9a1950a11acecf5bc384cf7fcb78492aaf0f4768dc211b362dc5034415e
SHA1 hash: 5747f6d5698942b420a17b4a28625d2e9d4230ca
MD5 hash: fc5d6113104c2b570f515e4cf87fab8d
humanhash: december-gee-georgia-beryllium
File name:Install.exe
Download: download sample
Signature RedLineStealer
File size:2'514'067 bytes
First seen:2022-07-03 13:47:41 UTC
Last seen:2022-07-03 14:41:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 726a22f55cf9e91b15fd25cd9f82556f (17 x RedLineStealer, 2 x ArkeiStealer, 1 x PhoenixStealer)
ssdeep 24576:4RnU4/VYPYwYNxYfCM2aRKlijDt7TnJ76hTg6ALxf5qrl3RuQ55313Y:4lU4SCDoZ7J76hTg6Ael3O
TLSH T164C51A139ACB0E75DDD23BB461CB633AA734ED30CA2A9B7FB609C43559532C46C1A742
TrID 33.5% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
21.3% (.EXE) Win64 Executable (generic) (10523/12/4)
13.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
10.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
9.1% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter JaffaCakes118
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
299
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Install.exe
Verdict:
Malicious activity
Analysis date:
2022-07-03 13:47:22 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionGetTickCount
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug overlay packed spyeye
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine, Xmrig
Detection:
malicious
Classification:
evad.troj.spyw.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Antivirus detection for dropped file
Connects to a pastebin service (likely for C&C)
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 656173 Sample: Install.exe Startdate: 03/07/2022 Architecture: WINDOWS Score: 100 88 api.ip.sb 2->88 90 store4.gofile.io 2->90 92 5 other IPs or domains 2->92 114 Snort IDS alert for network traffic 2->114 116 Malicious sample detected (through community Yara rule) 2->116 118 Antivirus detection for dropped file 2->118 120 11 other signatures 2->120 11 Install.exe 1 2->11         started        14 svchost.exe 2->14         started        16 svchost.exe 2->16         started        signatures3 process4 signatures5 128 Contains functionality to inject code into remote processes 11->128 130 Writes to foreign memory regions 11->130 132 Injects a PE file into a foreign processes 11->132 18 AppLaunch.exe 15 8 11->18         started        23 conhost.exe 11->23         started        process6 dnsIp7 94 149.57.171.97, 49761, 80 COGENT-174US United States 18->94 96 store4.gofile.io 31.14.70.245, 443, 49764 LINKER-ASFR Virgin Islands (BRITISH) 18->96 98 2 other IPs or domains 18->98 78 C:\Users\user\AppData\Local\Temp\svhost.exe, PE32 18->78 dropped 80 C:\Users\user\AppData\Local\...\conhost.exe, PE32 18->80 dropped 122 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->122 124 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->124 126 Tries to harvest and steal browser information (history, passwords, etc) 18->126 25 conhost.exe 30 18->25         started        30 svhost.exe 18->30         started        file8 signatures9 process10 dnsIp11 100 store1.gofile.io 31.14.70.242, 443, 49768, 49776 LINKER-ASFR Virgin Islands (BRITISH) 25->100 102 pastebin.com 104.20.67.143, 443, 49767, 49774 CLOUDFLARENETUS United States 25->102 82 C:\ProgramData\...\RuntimeBroker.exe, PE32 25->82 dropped 134 Multi AV Scanner detection for dropped file 25->134 136 Detected unpacking (changes PE section rights) 25->136 138 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 25->138 140 3 other signatures 25->140 32 RuntimeBroker.exe 25->32         started        36 cmd.exe 25->36         started        84 C:\Users\user\AppData\Local\Temp\...\7z.exe, PE32+ 30->84 dropped 86 C:\Users\user\AppData\Local\Temp\...\7z.dll, PE32+ 30->86 dropped 38 cmd.exe 30->38         started        file12 signatures13 process14 file15 76 C:\ProgramData\RuntimeBroker\winlogson.exe, PE32+ 32->76 dropped 104 Multi AV Scanner detection for dropped file 32->104 106 Machine Learning detection for dropped file 32->106 40 cmd.exe 32->40         started        42 cmd.exe 32->42         started        44 cmd.exe 32->44         started        52 11 other processes 32->52 108 Obfuscated command line found 36->108 110 Uses schtasks.exe or at.exe to add and modify task schedules 36->110 112 Adds a directory exclusion to Windows Defender 36->112 46 conhost.exe 36->46         started        48 chcp.com 36->48         started        50 powershell.exe 36->50         started        54 2 other processes 36->54 56 7 other processes 38->56 signatures16 process17 process18 58 conhost.exe 40->58         started        60 schtasks.exe 40->60         started        62 conhost.exe 42->62         started        64 schtasks.exe 42->64         started        66 conhost.exe 44->66         started        68 schtasks.exe 44->68         started        70 conhost.exe 52->70         started        72 schtasks.exe 52->72         started        74 19 other processes 52->74
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-07-03 13:48:10 UTC
File Type:
PE (Exe)
AV detection:
22 of 26 (84.62%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@hurekoiif evasion infostealer spyware trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks whether UAC is enabled
Checks BIOS information in registry
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RedLine
RedLine Payload
Malware Config
C2 Extraction:
149.57.171.97:80
Unpacked files
SH256 hash:
b2e5112b7f42637032d7a0c2ef03d7557c975b91b61e6be003bd6aa17fb4cc9e
MD5 hash:
1167d142b7543ff91dc6d0a1e00a5b8c
SHA1 hash:
ab55aa00f3263fd3a024715181092622cf7344d9
SH256 hash:
cda52f00a112c4001850f2659fcc0fd1eba55cc3375a4ca34f4de031f13ab5b8
MD5 hash:
fc5d6113104c2b570f515e4cf87fab8d
SHA1 hash:
5747f6d5698942b420a17b4a28625d2e9d4230ca
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe cda52f00a112c4001850f2659fcc0fd1eba55cc3375a4ca34f4de031f13ab5b8

(this sample)

  
Delivery method
Distributed via web download

Comments