MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1b138a211d4b9ce4d825f82669ba211e585a87eec0e877a2b8ef87a9e43ccb6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments

SHA256 hash: d1b138a211d4b9ce4d825f82669ba211e585a87eec0e877a2b8ef87a9e43ccb6
SHA3-384 hash: 9f6a3476b70b47988abe5d16440902fef6f760251cf0f1feb5282586e6b90959cb6f18f4e11e2f7fc436079f06725cf9
SHA1 hash: 1c7d84c4702540d46b8b7557b94d65f97a1cf0f1
MD5 hash: e0cfd7368fe27985e8df3605d46aca15
humanhash: fix-helium-oven-magnesium
File name:GenshinHack.exe
Download: download sample
Signature RedLineStealer
File size:4'791'296 bytes
First seen:2021-10-24 15:31:58 UTC
Last seen:2021-10-24 17:12:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 908bea7ee71339f1c35ba419da3ba679 (36 x RedLineStealer, 2 x RaccoonStealer)
ssdeep 98304:bLPzFpz/sydGA9zmSoFG0hEZrBYKv2rym9:hp4WGAno0NB699
Threatray 105 similar samples on MalwareBazaar
TLSH T15226127363694151E0E58C358537BEE432FF136A8F40A8BF66D67ACD19221D8E237A43
Reporter tech_skeech
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
425
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
GenshinHack.exe
Verdict:
Malicious activity
Analysis date:
2021-10-24 15:30:27 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Creates a thread in another existing process (thread injection)
Detected VMProtect packer
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Defender Exclusion
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION
Tries to steal Crypto Currency Wallets
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 508254 Sample: GenshinHack.exe Startdate: 24/10/2021 Architecture: WINDOWS Score: 100 104 Antivirus / Scanner detection for submitted sample 2->104 106 Multi AV Scanner detection for submitted file 2->106 108 Detected VMProtect packer 2->108 110 3 other signatures 2->110 13 GenshinHack.exe 2->13         started        16 services32.exe 2->16         started        process3 signatures4 150 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 13->150 152 Tries to shutdown other security tools via broadcasted WM_QUERYENDSESSION 13->152 154 Writes to foreign memory regions 13->154 156 Injects a PE file into a foreign processes 13->156 18 AppLaunch.exe 15 7 13->18         started        23 WerFault.exe 23 9 13->23         started        158 Allocates memory in foreign processes 16->158 160 Tries to detect virtualization through RDTSC time measurements 16->160 162 Creates a thread in another existing process (thread injection) 16->162 25 conhost.exe 16->25         started        process5 dnsIp6 90 185.209.22.181, 29234, 49712 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 18->90 92 cdn.discordapp.com 162.159.129.233, 443, 49717 CLOUDFLARENETUS United States 18->92 84 C:\Users\user\AppData\Local\Temp\build.exe, PE32+ 18->84 dropped 116 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->116 118 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->118 120 Tries to harvest and steal browser information (history, passwords, etc) 18->120 122 Tries to steal Crypto Currency Wallets 18->122 27 build.exe 18->27         started        86 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 23->86 dropped 124 Adds a directory exclusion to Windows Defender 25->124 30 sihost32.exe 25->30         started        32 cmd.exe 25->32         started        file7 signatures8 process9 signatures10 138 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 27->138 140 Writes to foreign memory regions 27->140 142 Allocates memory in foreign processes 27->142 144 Tries to detect virtualization through RDTSC time measurements 27->144 34 conhost.exe 4 27->34         started        146 Creates a thread in another existing process (thread injection) 30->146 38 conhost.exe 30->38         started        148 Adds a directory exclusion to Windows Defender 32->148 40 conhost.exe 32->40         started        42 powershell.exe 32->42         started        44 powershell.exe 32->44         started        process11 file12 82 C:\Users\user\services32.exe, PE32+ 34->82 dropped 112 Drops PE files to the user root directory 34->112 114 Adds a directory exclusion to Windows Defender 34->114 46 cmd.exe 34->46         started        48 cmd.exe 1 34->48         started        51 cmd.exe 1 34->51         started        signatures13 process14 signatures15 53 services32.exe 46->53         started        56 conhost.exe 46->56         started        100 Uses schtasks.exe or at.exe to add and modify task schedules 48->100 102 Adds a directory exclusion to Windows Defender 48->102 58 powershell.exe 20 48->58         started        60 conhost.exe 48->60         started        62 powershell.exe 48->62         started        64 conhost.exe 51->64         started        66 schtasks.exe 1 51->66         started        process16 signatures17 126 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 53->126 128 Writes to foreign memory regions 53->128 130 Allocates memory in foreign processes 53->130 132 Creates a thread in another existing process (thread injection) 53->132 68 conhost.exe 53->68         started        process18 dnsIp19 94 github.com 140.82.121.3, 443, 49718 GITHUBUS United States 68->94 96 raw.githubusercontent.com 185.199.108.133, 443, 49719 FASTLYUS Netherlands 68->96 98 sanctam.net 68->98 88 C:\Users\user\AppData\...\sihost32.exe, PE32+ 68->88 dropped 134 Adds a directory exclusion to Windows Defender 68->134 73 cmd.exe 68->73         started        file20 signatures21 process22 signatures23 136 Adds a directory exclusion to Windows Defender 73->136 76 conhost.exe 73->76         started        78 powershell.exe 73->78         started        80 powershell.exe 73->80         started        process24
Threat name:
Win32.Trojan.Razy
Status:
Malicious
First seen:
2021-10-24 15:32:06 UTC
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@cherryvishny infostealer spyware vmprotect
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
Malware Config
C2 Extraction:
185.209.22.181:29234
Unpacked files
SH256 hash:
75a620a9aa3ccfd132882556a4b93c97ad4cefa7e19aeca09aa7c3838c74474b
MD5 hash:
55d9222860a318f33eb8d15df6a7f0bd
SHA1 hash:
5a02f083fa776648b80f276cd8e0e4657650750c
SH256 hash:
d1b138a211d4b9ce4d825f82669ba211e585a87eec0e877a2b8ef87a9e43ccb6
MD5 hash:
e0cfd7368fe27985e8df3605d46aca15
SHA1 hash:
1c7d84c4702540d46b8b7557b94d65f97a1cf0f1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe d1b138a211d4b9ce4d825f82669ba211e585a87eec0e877a2b8ef87a9e43ccb6

(this sample)

Comments