MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 11 File information Comments

SHA256 hash: d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687
SHA3-384 hash: f11b7a31eba38021433f4fc718674a9ec02880b4b61a03f62db4c04c6fd20abfdf5e2745b16bb9e8612c20ee6a5db14c
SHA1 hash: 357ae7d706de393d8743dbbe0d94bc87922643cf
MD5 hash: 6af6a7fac1197a9b12b28c0e4db8c18a
humanhash: august-beer-july-leopard
File name:file.exe
Download: download sample
Signature RedLineStealer
File size:1'262'619 bytes
First seen:2023-05-17 15:26:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 12e12319f1029ec4f8fcbed7e82df162 (388 x DCRat, 52 x RedLineStealer, 51 x Formbook)
ssdeep 24576:2TbBv5rUyXVTW6Hq69NuPQPyUfezTtJiC7nVUriVGAQ+hw17tq:IBJTzHqBQrW3tEwnGtdCOBq
Threatray 16 similar samples on MalwareBazaar
TLSH T1E7451241BAC1D4B2D5630C326B695B21A83C7D202F25CEEF53D06E5EDA316D0EB35B62
TrID 89.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.5% (.EXE) Win64 Executable (generic) (10523/12/4)
2.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
1.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
267
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file.exe
Verdict:
Malicious activity
Analysis date:
2023-05-17 15:31:38 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process from a recently created file
Launching a process
Launching the default Windows debugger (dwwin.exe)
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm cmd cmd.exe greyware overlay packed packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
MinerDownloader, RedLine, Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Encrypted powershell cmdline option found
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found strings related to Crypto-Mining
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample is not signed and drops a device driver
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected AntiVM3
Yara detected Generic MinerDownloader
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 868465 Sample: file.exe Startdate: 17/05/2023 Architecture: WINDOWS Score: 100 79 pastebin.com 2->79 99 Snort IDS alert for network traffic 2->99 101 Multi AV Scanner detection for domain / URL 2->101 103 Found malware configuration 2->103 105 18 other signatures 2->105 12 file.exe 11 2->12         started        signatures3 process4 file5 69 C:\Users\user\AppData\...\yee9mbi69cm7.exe, PE32 12->69 dropped 71 C:\Users\user\AppData\Local\...\4usfliof.exe, PE32 12->71 dropped 15 cmd.exe 1 12->15         started        process6 signatures7 123 Encrypted powershell cmdline option found 15->123 125 Uses schtasks.exe or at.exe to add and modify task schedules 15->125 18 yee9mbi69cm7.exe 1 15->18         started        21 4usfliof.exe 1 15->21         started        23 conhost.exe 15->23         started        25 cmd.exe 1 15->25         started        process8 signatures9 87 Antivirus detection for dropped file 18->87 89 Multi AV Scanner detection for dropped file 18->89 91 Machine Learning detection for dropped file 18->91 27 RegSvcs.exe 1 18->27         started        30 WerFault.exe 18->30         started        93 Writes to foreign memory regions 21->93 95 Allocates memory in foreign processes 21->95 97 Injects a PE file into a foreign processes 21->97 32 RegSvcs.exe 14 4 21->32         started        35 WerFault.exe 23 9 21->35         started        process10 dnsIp11 109 Writes to foreign memory regions 27->109 111 Injects a PE file into a foreign processes 27->111 37 AppLaunch.exe 27->37         started        42 conhost.exe 27->42         started        73 135.181.7.171, 49727, 81 HETZNER-ASDE Germany 32->73 75 api.ip.sb 32->75 113 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 32->113 115 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 32->115 117 Tries to harvest and steal browser information (history, passwords, etc) 32->117 119 Tries to steal Crypto Currency Wallets 32->119 77 192.168.2.1 unknown unknown 35->77 signatures12 process13 dnsIp14 81 github.com 140.82.121.4, 443, 49721, 49722 GITHUBUS United States 37->81 83 raw.githubusercontent.com 185.199.110.133, 443, 49724, 49725 FASTLYUS Netherlands 37->83 85 pastebin.com 104.20.68.143, 443, 49720 CLOUDFLARENETUS United States 37->85 61 C:\ProgramData\Dllhost\winlogson.exe, PE32+ 37->61 dropped 63 C:\ProgramData\Dllhost\dllhost.exe, PE32 37->63 dropped 65 C:\ProgramData\Dllhost\WinRing0x64.sys, PE32+ 37->65 dropped 67 C:\ProgramData\HostData\logs.uce, ASCII 37->67 dropped 107 Sample is not signed and drops a device driver 37->107 44 cmd.exe 37->44         started        47 cmd.exe 37->47         started        49 cmd.exe 37->49         started        file15 signatures16 process17 signatures18 121 Encrypted powershell cmdline option found 44->121 51 conhost.exe 44->51         started        53 powershell.exe 44->53         started        55 conhost.exe 47->55         started        57 schtasks.exe 47->57         started        59 conhost.exe 49->59         started        process19
Threat name:
Win32.Trojan.Lazy
Status:
Malicious
First seen:
2023-05-17 15:27:09 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:2 infostealer spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
RedLine
Malware Config
C2 Extraction:
135.181.7.171:81
Unpacked files
SH256 hash:
4eb3f880e8a30b11d0f0d11f84644296595bbe1ace3bc4ade1d69787cf9a6bb2
MD5 hash:
3029c29b4dae06ccac69a6579062be97
SHA1 hash:
0da7516f82dc3a973f76d92fa906c5546d482272
SH256 hash:
a3f23f0e13931b117e6035e81f61d428147a87ee3b3cf0d35c2e5feb6ead9754
MD5 hash:
d5fb68873f57d42ee9bc44c6ee64a77d
SHA1 hash:
1a8d70cc0fe26ca12d18d4ab4f12f8542bdcfade
Detections:
redline
SH256 hash:
363d8f2cdfd204a1513288071b2fafcafcb6c46364da351f8247b394143e9bff
MD5 hash:
8d76dab422c08ec5c3bdf357a7c5a928
SHA1 hash:
3cbbd56c52a113c5532d379baaed78d8b1b553b5
SH256 hash:
d0a2035c0431796c138a26d1c9a75142b613c5417dc96a9200723870d0b3a687
MD5 hash:
6af6a7fac1197a9b12b28c0e4db8c18a
SHA1 hash:
357ae7d706de393d8743dbbe0d94bc87922643cf
Malware family:
RedLine.E
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:AppLaunch
Author:iam-py-test
Description:Detect files referencing .Net AppLaunch.exe
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_EXE_RawPaste_URL
Author:ditekSHen
Description:Detects executables (downlaoders) containing URLs to raw contents of a paste
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:SelfExtractingRAR
Author:Xavier Mertens
Description:Detects an SFX archive with automatic script execution
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Win32_Trojan_RedLineStealer
Author:Netskope Threat Labs
Description:Identifies RedLine Stealer samples
Reference:deb95cae4ba26dfba536402318154405
Rule name:win_nullmixer_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.nullmixer.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments