MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d673b8f790d1a92b00b4cfe07f962747116b63dfade5c4772d085ae37878305f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 7 File information Comments

SHA256 hash: d673b8f790d1a92b00b4cfe07f962747116b63dfade5c4772d085ae37878305f
SHA3-384 hash: 63afbad3d3127801f234d46d1d580ab0c05d015ef252efc871a5994be58ae2939361c3c81ad42c6eb4bd05b45813fc97
SHA1 hash: e13fac0b4e23cdd4c39f1ef0a769de80b1d36ea1
MD5 hash: 98e380a1b54840a29eb84c217a96028b
humanhash: cold-batman-eleven-whiskey
File name:98e380a1b54840a29eb84c217a96028b.exe
Download: download sample
Signature RedLineStealer
File size:373'760 bytes
First seen:2021-07-29 19:16:05 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'662 x AgentTesla, 19'477 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 3072:68MHrYUVNCkr/Rrd1hthQI1PSbYOc9WhgwqkO+7m58gCp3D9qp9PYBV5KXgM2uX9:1OLvCkr/Rjhtht1POG9Whgwqk7m587B
Threatray 11 similar samples on MalwareBazaar
TLSH T1FF84342864BFC05984E3EEA52EDCA8FBD99A55E3640C743701B4633B8B51B80DE4F479
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
188.130.139.12:23747

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
188.130.139.12:23747 https://threatfox.abuse.ch/ioc/164571/

Intelligence


File Origin
# of uploads :
1
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Download.exe
Verdict:
Malicious activity
Analysis date:
2021-07-24 20:30:02 UTC
Tags:
trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine Xmrig
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains very large strings
Changes security center settings (notifications, updates, antivirus, firewall)
DNS related to crypt mining pools
Hides threads from debuggers
Injects a PE file into a foreign processes
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file has a writeable .text section
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Xmrig
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 456508 Sample: UvVE6mXveZ.exe Startdate: 29/07/2021 Architecture: WINDOWS Score: 100 65 xmr-eu1.nanopool.org 2->65 83 Sigma detected: Xmrig 2->83 85 Multi AV Scanner detection for dropped file 2->85 87 Multi AV Scanner detection for submitted file 2->87 89 8 other signatures 2->89 10 UvVE6mXveZ.exe 2 2->10         started        14 gitlibcontrol.exe 2->14         started        17 svchost.exe 2->17         started        19 9 other processes 2->19 signatures3 process4 dnsIp5 41 C:\Users\user\AppData\...\UvVE6mXveZ.exe.log, ASCII 10->41 dropped 103 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->103 105 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 10->105 107 Injects a PE file into a foreign processes 10->107 21 UvVE6mXveZ.exe 15 34 10->21         started        26 conhost.exe 10->26         started        73 iplogger.org 14->73 75 bitbucket.org 14->75 43 C:\ProgramData\Systemd\old.exe (copy), PE32+ 14->43 dropped 45 C:\ProgramData\Systemd\Database.exe, PE32+ 14->45 dropped 47 C:\ProgramData\Data\Datahub.exe, PE32+ 14->47 dropped 49 C:\ProgramData\Data\old.exe (copy), PE32+ 14->49 dropped 109 Changes security center settings (notifications, updates, antivirus, firewall) 17->109 77 127.0.0.1 unknown unknown 19->77 79 192.168.2.1 unknown unknown 19->79 file6 signatures7 process8 dnsIp9 67 188.130.139.12, 23747, 49715, 49719 ASKONTELRU Russian Federation 21->67 69 oqtisexport.com 103.227.176.29, 443, 49721 A2HOSTINGUS Singapore 21->69 71 api.ip.sb 21->71 39 C:\Users\user\AppData\Local\...\install.exe, PE32 21->39 dropped 99 Tries to harvest and steal browser information (history, passwords, etc) 21->99 101 Tries to steal Crypto Currency Wallets 21->101 28 install.exe 14 188 21->28         started        file10 signatures11 process12 file13 51 C:\Users\user\AppData\...\gitlibcontrol.exe, PE32 28->51 dropped 53 C:\Users\user\AppData\Local\...\temp_0.tmp, Microsoft 28->53 dropped 55 C:\Users\user\AppData\...\ue32ctmn20.dll, PE32 28->55 dropped 57 20 other files (none is malicious) 28->57 dropped 111 Multi AV Scanner detection for dropped file 28->111 32 gitlibcontrol.exe 28->32         started        signatures14 process15 dnsIp16 59 iplogger.org 88.99.66.31 HETZNER-ASDE Germany 32->59 61 bitbucket.org 104.192.141.1 AMAZON-02US United States 32->61 63 3 other IPs or domains 32->63 81 May check the online IP address of the machine 32->81 36 Datahub.exe 32->36         started        signatures17 process18 signatures19 91 Query firmware table information (likely to detect VMs) 36->91 93 Tries to detect sandboxes and other dynamic analysis tools (window names) 36->93 95 Hides threads from debuggers 36->95 97 Tries to detect sandboxes / dynamic malware analysis system (registry check) 36->97
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2021-07-24 22:33:52 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:@robinvvood discovery evasion infostealer spyware stealer themida trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
RedLine
RedLine Payload
Malware Config
C2 Extraction:
188.130.139.12:23747
Unpacked files
SH256 hash:
84a953479a6a24fed1f3ecf7ff4936253ec8dcf846fb88e45897cb4ef277c36f
MD5 hash:
209c4eb3324cfc75e40cb77eb556fd3a
SHA1 hash:
0b8503bf66923c3da08a9e11bd1bd2dd410ba3ec
SH256 hash:
d673b8f790d1a92b00b4cfe07f962747116b63dfade5c4772d085ae37878305f
MD5 hash:
98e380a1b54840a29eb84c217a96028b
SHA1 hash:
e13fac0b4e23cdd4c39f1ef0a769de80b1d36ea1
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:RedLine
Author:@bartblaze
Description:Identifies RedLine stealer.
Rule name:redline_new_bin
Author:James_inthe_box
Description:Redline stealer
Reference:https://app.any.run/tasks/4921d1fe-1a14-4bf2-9d27-c443353362a8
Rule name:redline_stealer
Author:jeFF0Falltrades
Description:This rule matches unpacked RedLine Stealer samples and derivatives (as of APR2021)
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments