MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cf59bb0d65b42fbd66968ff5b7c97e0d5ab2aff46e672f12f701a22bc9ed904b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 5 File information Comments

SHA256 hash: cf59bb0d65b42fbd66968ff5b7c97e0d5ab2aff46e672f12f701a22bc9ed904b
SHA3-384 hash: 304477f4375f13a6fb9d56ba8876c23555532637fa95053150aece7cfb48c47849a55e8842e6ae6fd580919897a45dbe
SHA1 hash: 7bdd2f352486f3cd240a936ceaeb545eb08a1eaf
MD5 hash: e35d508aef7f018999a7b2d60d043795
humanhash: india-may-may-magnesium
File name:41.exe
Download: download sample
Signature RedLineStealer
File size:2'167'808 bytes
First seen:2023-08-19 21:27:38 UTC
Last seen:2023-09-18 04:16:28 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cea7ae85c87ddc7295d39ff9cda31d1 (90 x LummaStealer, 85 x RedLineStealer, 62 x Rhadamanthys)
ssdeep 49152:/sesd+yXDBfhcNhlKxQaDIhtRUN8BF9JJyfxUFOrhIZGnMvQD:SdHTBfhcNhlKDQUN8BF9JJyJSjOMvC
Threatray 1 similar samples on MalwareBazaar
TLSH T10DA5335AA3E82161E539077688F3230BE6F1BC648B7922AF13C5D63F1D23AD67571702
TrID 83.0% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
6.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
4.4% (.EXE) Win64 Executable (generic) (10523/12/4)
2.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.8% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter ULTRAFRAUD
Tags:2-155-18-40-9000 exe Redline RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
367
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
41.exe
Verdict:
Suspicious activity
Analysis date:
2023-08-19 21:31:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Launching a process
Searching for the window
Сreating synchronization primitives
Using the Windows Management Instrumentation requests
Creating a file in the Program Files subdirectories
Creating a service
Launching a service
Modifying a system file
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Creating a file
Creating a file in the system32 subdirectories
Enabling autorun for a service
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
n/a
Detection:
malicious
Classification:
spyw.evad
Score:
72 / 100
Signature
Binary is likely a compiled AutoIt script file
Contains functionality to modify clipboard data
Creates files in the system32 config directory
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Tries to delay execution (extensive OutputDebugStringW loop)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1293910 Sample: 41.exe Startdate: 19/08/2023 Architecture: WINDOWS Score: 72 43 Multi AV Scanner detection for dropped file 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 Binary is likely a compiled AutoIt script file 2->47 9 41.exe 1 4 2->9         started        12 MeshAgent.exe 7 8 2->12         started        16 svchost.exe 1 2->16         started        process3 dnsIp4 37 C:\Users\user\AppData\Local\...\setup.exe, PE32 9->37 dropped 39 C:\Users\user\AppData\Local\...\INSTAT~1.EXE, PE32+ 9->39 dropped 18 INSTAT~1.EXE 9->18         started        41 192.168.0.19, 23778 unknown unknown 12->41 57 Creates files in the system32 config directory 12->57 file5 signatures6 process7 signatures8 49 Binary is likely a compiled AutoIt script file 18->49 51 Contains functionality to modify clipboard data 18->51 21 setup.exe 2 18->21         started        process9 signatures10 53 Multi AV Scanner detection for dropped file 21->53 55 Tries to delay execution (extensive OutputDebugStringW loop) 21->55 24 setup.exe 10 3 21->24         started        27 WMIC.exe 1 21->27         started        29 conhost.exe 21->29         started        process11 file12 35 C:\Program Files (x86)\...\MeshAgent.exe, PE32 24->35 dropped 31 conhost.exe 24->31         started        33 conhost.exe 27->33         started        process13
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Modifies data under HKEY_USERS
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
AutoIT Executable
Drops file in System32 directory
Adds Run key to start application
Executes dropped EXE
Loads dropped DLL
Sets service image path in registry
Unpacked files
SH256 hash:
cf59bb0d65b42fbd66968ff5b7c97e0d5ab2aff46e672f12f701a22bc9ed904b
MD5 hash:
e35d508aef7f018999a7b2d60d043795
SHA1 hash:
7bdd2f352486f3cd240a936ceaeb545eb08a1eaf
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:detect_Redline_Stealer
Author:Varp0s
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments