MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d61d33074ee4ad694efb6573a5f40923cd31c96d78a9a54934c11e0671766b8c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA File information Comments

SHA256 hash: d61d33074ee4ad694efb6573a5f40923cd31c96d78a9a54934c11e0671766b8c
SHA3-384 hash: 13474070c62b7b273d7e271c4899f31d0645499625807deeb74ec726a664fcc2e4009cf79f30d7be0fc18050b8f9424e
SHA1 hash: 987eb726373c3c8d23c7a60c16a7134f9d112c5b
MD5 hash: 8b950c7b5909bc6ab5169492645d58c0
humanhash: monkey-table-ink-august
File name:8b950c7b5909bc6ab5169492645d58c0.exe
Download: download sample
Signature RedLineStealer
File size:457'728 bytes
First seen:2021-09-29 13:46:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7182b1ea6f92adbf459a2c65d8d4dd9e (5 x CoinMiner, 4 x RedLineStealer, 4 x DCRat)
ssdeep 12288:IbjDhu9TlMgJ/lyUz81DWkqO5NCex1y54O3sk:21eTlMgJ//89RqO5NCefy54O3sk
Threatray 67 similar samples on MalwareBazaar
TLSH T1D7A4F16672E02158D6B682F6C9921746EA3170721B15B3DF27B853B21B2F4DA8F3D3D0
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
80.87.192.137:27018

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
80.87.192.137:27018 https://threatfox.abuse.ch/ioc/227545/

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Creating a process from a recently created file
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Creating a file in the Windows subdirectories
Deleting a recently created file
Replacing files
Using the Windows Management Instrumentation requests
Creating a file
Reading critical registry keys
Stealing user critical data
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
60 / 100
Signature
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected BatToExe compiled binary
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 493815 Sample: V4dT41mWTo.exe Startdate: 30/09/2021 Architecture: WINDOWS Score: 60 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected BatToExe compiled binary 2->30 7 V4dT41mWTo.exe 9 2->7         started        process3 file4 22 C:\Users\user\AppData\Local\Temp\...\extd.exe, PE32+ 7->22 dropped 10 cmd.exe 1 3 7->10         started        process5 process6 12 extd.exe 2 10->12         started        16 extd.exe 2 10->16         started        18 conhost.exe 10->18         started        20 extd.exe 1 10->20         started        dnsIp7 24 cdn.discordapp.com 162.159.135.233, 443, 49743 CLOUDFLARENETUS United States 12->24 32 Multi AV Scanner detection for dropped file 12->32 26 162.159.129.233, 443, 49750 CLOUDFLARENETUS United States 16->26 signatures8
Threat name:
Win64.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-29 13:47:06 UTC
AV detection:
18 of 45 (40.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer upx
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
RedLine
RedLine Payload
Malware Config
C2 Extraction:
80.87.192.137:27018
Unpacked files
SH256 hash:
d61d33074ee4ad694efb6573a5f40923cd31c96d78a9a54934c11e0671766b8c
MD5 hash:
8b950c7b5909bc6ab5169492645d58c0
SHA1 hash:
987eb726373c3c8d23c7a60c16a7134f9d112c5b
Malware family:
RedLine.A
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe d61d33074ee4ad694efb6573a5f40923cd31c96d78a9a54934c11e0671766b8c

(this sample)

  
Delivery method
Distributed via web download

Comments