MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0d72bb86445f46afd1cff56e317543011d1d4a4b6ba18791b63b26a7282af7c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA File information Comments

SHA256 hash: d0d72bb86445f46afd1cff56e317543011d1d4a4b6ba18791b63b26a7282af7c
SHA3-384 hash: 04c07899356681a61a41b8f0d94a963e6795a0434f8d14fc72236b0e6f4ad1f2e9a368d390e7709ed3c74e4e6bf6de6f
SHA1 hash: 3d2ff8f05f38d4ed25ceb0acdaccb7a77947553a
MD5 hash: 9a753beb650c0d6827e05507349d5e2c
humanhash: comet-table-texas-march
File name:setup.exe
Download: download sample
Signature RedLineStealer
File size:217'088 bytes
First seen:2022-11-27 03:34:58 UTC
Last seen:2022-11-27 05:27:18 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 3f7efe3b4d94e5183ceea7403176c7cf (3 x RedLineStealer, 1 x ArkeiStealer)
ssdeep 6144:C0ZHhsUGfobUee60OB8coWdGe7/M7tp6:bzGfobUeY4hoWj7/M7
Threatray 19'658 similar samples on MalwareBazaar
TLSH T10E24BE037A5264A9C961D47CB0B396F0E6BE5D2633F52049375F30A677136BA13BA23C
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter tcains1
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
268
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
setup.exe
Verdict:
Malicious activity
Analysis date:
2022-11-27 03:05:28 UTC
Tags:
redline loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Creating a window
Sending a custom TCP request
Сreating synchronization primitives
DNS request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Sending an HTTP GET request
Creating a file
Creating a process from a recently created file
Creating a file in the %temp% directory
Running batch commands
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a recently created process
Unauthorized injection to a system process
Enabling autorun by creating a file
Sending an HTTP GET request to an infection source
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
babar greyware packed ransomware redline
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates files in the system32 config directory
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Encrypted powershell cmdline option found
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 754509 Sample: setup.exe Startdate: 27/11/2022 Architecture: WINDOWS Score: 100 124 Snort IDS alert for network traffic 2->124 126 Malicious sample detected (through community Yara rule) 2->126 128 Antivirus detection for dropped file 2->128 130 9 other signatures 2->130 10 setup.exe 1 2->10         started        13 powershell.exe 2->13         started        15 chrome.exe 2->15         started        17 4 other processes 2->17 process3 signatures4 158 Contains functionality to inject code into remote processes 10->158 160 Writes to foreign memory regions 10->160 162 Allocates memory in foreign processes 10->162 19 vbc.exe 15 9 10->19         started        24 conhost.exe 10->24         started        164 Creates files in the system32 config directory 13->164 166 Sample uses process hollowing technique 13->166 168 Injects a PE file into a foreign processes 13->168 36 2 other processes 13->36 170 Encrypted powershell cmdline option found 15->170 172 Drops executables to the windows directory (C:\Windows) and starts them 15->172 26 powershell.exe 15->26         started        28 powershell.exe 15->28         started        30 schtasks.exe 15->30         started        38 4 other processes 15->38 32 schtasks.exe 1 17->32         started        34 conhost.exe 17->34         started        process5 dnsIp6 114 79.137.204.112, 49703, 80 PSKSET-ASRU Russian Federation 19->114 116 www.idpminic.org 19->116 118 3 other IPs or domains 19->118 102 C:\Users\user\AppData\Localbehaviorgraphoogle\ofg.exe, PE32 19->102 dropped 104 C:\Users\user\AppData\Local\...\chrome.exe, PE32 19->104 dropped 106 C:\Users\user\AppData\Local\...\brave.exe, PE32+ 19->106 dropped 132 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 19->132 134 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 19->134 136 Tries to harvest and steal browser information (history, passwords, etc) 19->136 138 Tries to steal Crypto Currency Wallets 19->138 40 chrome.exe 1 19->40         started        44 brave.exe 2 19->44         started        46 ofg.exe 19->46         started        48 conhost.exe 26->48         started        50 conhost.exe 28->50         started        52 conhost.exe 30->52         started        54 conhost.exe 32->54         started        56 conhost.exe 38->56         started        file7 signatures8 process9 file10 108 C:\WindowsbehaviorgraphoogleUpdate.exe, PE32 40->108 dropped 140 Antivirus detection for dropped file 40->140 142 Multi AV Scanner detection for dropped file 40->142 144 Machine Learning detection for dropped file 40->144 154 4 other signatures 40->154 58 GoogleUpdate.exe 40->58         started        61 GoogleUpdate.exe 40->61         started        64 powershell.exe 3 40->64         started        74 3 other processes 40->74 110 C:\Users\user\AppData\Local\Temp552.tmp, PE32+ 44->110 dropped 112 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 44->112 dropped 146 Writes to foreign memory regions 44->146 148 Modifies the context of a thread in another process (thread injection) 44->148 150 Found hidden mapped module (file has been removed from disk) 44->150 156 2 other signatures 44->156 66 cmd.exe 1 44->66         started        68 cmd.exe 1 44->68         started        70 powershell.exe 44->70         started        76 3 other processes 44->76 152 Uses schtasks.exe or at.exe to add and modify task schedules 46->152 72 schtasks.exe 1 46->72         started        signatures11 process12 dnsIp13 174 Detected unpacking (changes PE section rights) 58->174 176 Detected unpacking (overwrites its own PE header) 58->176 178 Uses netsh to modify the Windows network and firewall settings 58->178 188 2 other signatures 58->188 120 api.peer2profit.com 172.66.43.60, 443, 49710, 49712 CLOUDFLARENETUS United States 61->120 122 51.195.77.248, 443, 49711, 49713 OVHFR France 61->122 180 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 61->180 78 netsh.exe 61->78         started        84 2 other processes 61->84 80 conhost.exe 64->80         started        182 Uses cmd line tools excessively to alter registry or file data 66->182 184 Uses powercfg.exe to modify the power settings 66->184 186 Modifies power options to not sleep / hibernate 66->186 86 11 other processes 66->86 88 5 other processes 68->88 90 2 other processes 70->90 82 conhost.exe 72->82         started        92 3 other processes 74->92 94 2 other processes 76->94 signatures14 process15 process16 96 conhost.exe 78->96         started        98 conhost.exe 84->98         started        100 conhost.exe 84->100         started       
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-11-27 00:32:12 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
24 of 41 (58.54%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@norka16 evasion infostealer spyware
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Drops file in Windows directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
Stops running service(s)
Modifies security service
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
79.137.204.112:80
Gathering data
Unpacked files
SH256 hash:
cde6cd3b784e180e46dd5910cf52496a3429a4d83f88dbffbab3f827403727b5
MD5 hash:
0ca4e60982f48bc578c941b4c46c7e4d
SHA1 hash:
b4f709628ffd097eeafea6cf15c41d5c07061af9
Detections:
redline
SH256 hash:
d0d72bb86445f46afd1cff56e317543011d1d4a4b6ba18791b63b26a7282af7c
MD5 hash:
9a753beb650c0d6827e05507349d5e2c
SHA1 hash:
3d2ff8f05f38d4ed25ceb0acdaccb7a77947553a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe d0d72bb86445f46afd1cff56e317543011d1d4a4b6ba18791b63b26a7282af7c

(this sample)

  
Delivery method
Distributed via web download

Comments