MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d463ce5d8b949fdb1a369aacc3e30f2bd89719c05a4960640dc42ac15b2bea0b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 1 File information Comments

SHA256 hash: d463ce5d8b949fdb1a369aacc3e30f2bd89719c05a4960640dc42ac15b2bea0b
SHA3-384 hash: 7b39146a8704c21d1fed27f8a4e1d45ad4631be1289f36a4edb24d86e87525d6479b328014ef98c6dc5e9598b4577517
SHA1 hash: e0e3cbd32d832a4a1462b05f65cdee2fea6364c1
MD5 hash: d2a7e15bafee524ad1f0eb7174fca6e6
humanhash: magazine-california-maine-princess
File name:d463ce5d8b949fdb1a369aacc3e30f2bd89719c05a496.exe
Download: download sample
Signature RedLineStealer
File size:459'264 bytes
First seen:2021-11-06 09:56:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 9e4746628ebaf71569a51552a1011d76 (6 x RedLineStealer, 3 x RaccoonStealer, 1 x Smoke Loader)
ssdeep 12288:xIABXSFOpr/K/Iv6KXoM7kQUCSgEY7CQ:6AwFOxd7AvZ
Threatray 4'011 similar samples on MalwareBazaar
TLSH T183A4BF40B7A1C039F5B252F87975D2A8A83A7DE1A73450CF22D53AEE5634AE0EC71707
File icon (PE):PE icon
dhash icon b2dacabecee6baa6 (148 x RedLineStealer, 145 x Stop, 100 x Smoke Loader)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
65.108.55.203:56717

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
65.108.55.203:56717 https://threatfox.abuse.ch/ioc/244568/

Intelligence


File Origin
# of uploads :
1
# of downloads :
144
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Strab
Status:
Malicious
First seen:
2021-11-06 09:57:05 UTC
AV detection:
25 of 45 (55.56%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:zolosad discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
65.108.55.203:56717
Unpacked files
SH256 hash:
2d89e1e627fdac26b534135adeaa5c4c615d960e31b598a50e162a289778cdbf
MD5 hash:
e8d687aa2d7e1a3304d023f81c6fbc3f
SHA1 hash:
b3ba7168686e132dfd8a53e1e100ed69a7ca1217
SH256 hash:
4b28362a29bf3d98bfcbaf6ea42bcd581b8caad07e667b68ca5f73fbc4ef9825
MD5 hash:
6ea2b407fd52f13736f31c25b4d77856
SHA1 hash:
52b866f4f53e61a8a1da334ef16b334cc457b784
SH256 hash:
c49118d9a193de3a38c14d38b2cbed37307d84f9e832f5ee1def5206f2f9e08d
MD5 hash:
3dc9b3bafec1e2b5b33a0787fab42271
SHA1 hash:
44661a13dae80265e45deeaf1a8bbf419892b752
SH256 hash:
d463ce5d8b949fdb1a369aacc3e30f2bd89719c05a4960640dc42ac15b2bea0b
MD5 hash:
d2a7e15bafee524ad1f0eb7174fca6e6
SHA1 hash:
e0e3cbd32d832a4a1462b05f65cdee2fea6364c1
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments