MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d9213d0adeb046eda1ab1551235f3d5f4566acebe327b7e817effccf5f6d9070. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs 1 YARA 2 File information Comments

SHA256 hash: d9213d0adeb046eda1ab1551235f3d5f4566acebe327b7e817effccf5f6d9070
SHA3-384 hash: d4014f1b4c0ddeed2d06a8d75923b957bddca0719f713484576114773d6d7f6dc4b9d485c347aaf56f9174306b17c599
SHA1 hash: b0c3a45d1f2ad37fdc840553fc6638f74a38a66e
MD5 hash: a9898d9c1520abc9310c3679d142dd7f
humanhash: artist-friend-zulu-bluebird
File name:a9898d9c1520abc9310c3679d142dd7f.exe
Download: download sample
Signature RedLineStealer
File size:709'632 bytes
First seen:2022-01-28 00:20:43 UTC
Last seen:2022-01-28 01:37:19 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:VnQPOxYe9HPn5aXZ587xyseyvJi2ElShvQxLdv:Wmx5HvsXcxyHAqdv
Threatray 4'862 similar samples on MalwareBazaar
TLSH T19EE4E11B769ACA21C22813BB40DFC15803756D569223D74ABEC933EE0B1279B5F4D26F
File icon (PE):PE icon
dhash icon 136d455d6d4d550b (25 x AgentTesla, 9 x Formbook, 5 x Loki)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
62.197.136.3:7766

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
62.197.136.3:7766 https://threatfox.abuse.ch/ioc/353832/

Intelligence


File Origin
# of uploads :
2
# of downloads :
242
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
DNS request
Unauthorized injection to a recently created process
Creating a file
Сreating synchronization primitives
Sending an HTTP POST request
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control.exe obfuscated packed replace.exe update.exe
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
96 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
Yara detected AntiVM3
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 561895 Sample: heyDArSomx.exe Startdate: 28/01/2022 Architecture: WINDOWS Score: 96 26 Found malware configuration 2->26 28 Multi AV Scanner detection for submitted file 2->28 30 Yara detected RedLine Stealer 2->30 32 6 other signatures 2->32 7 heyDArSomx.exe 3 2->7         started        process3 file4 22 C:\Users\user\AppData\...\heyDArSomx.exe.log, ASCII 7->22 dropped 34 Injects a PE file into a foreign processes 7->34 11 heyDArSomx.exe 15 3 7->11         started        14 heyDArSomx.exe 7->14         started        16 heyDArSomx.exe 7->16         started        18 2 other processes 7->18 signatures5 process6 dnsIp7 24 62.197.136.3, 49796, 49808, 49810 SPRINTLINKUS Netherlands 11->24 20 conhost.exe 11->20         started        process8
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2022-01-26 08:56:17 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:basics infostealer
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
RedLine
RedLine Payload
Malware Config
C2 Extraction:
62.197.136.3:7766
Unpacked files
SH256 hash:
77eeac1f26710e1bee407443ab139fb678bda187ee5b4b477e8151da82df361a
MD5 hash:
bf95e50efb807b6b42d3ae20626a63ae
SHA1 hash:
e024af8a6d736ff92b62a5e8af8395f5eda4c424
SH256 hash:
f5b93b410a536aa6cdb3836b7bd9904a321c160ddcedb5637c91ad2eb18d7d64
MD5 hash:
398c6bb9864e0c3b17d56d3dd5f68307
SHA1 hash:
ddc7548ef2298c5f3c7829eb5e219d3043d0322f
SH256 hash:
8325a5cf7942bb46ac528c836b79180c05d71a4e7de108693d303d56bcc5def1
MD5 hash:
efdf2c54a74297c24bc73285376c432b
SHA1 hash:
564f25afb6c5599cdcd5fafaff32c1475e581af4
SH256 hash:
d9213d0adeb046eda1ab1551235f3d5f4566acebe327b7e817effccf5f6d9070
MD5 hash:
a9898d9c1520abc9310c3679d142dd7f
SHA1 hash:
b0c3a45d1f2ad37fdc840553fc6638f74a38a66e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments