MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 da928ea0a7b11461c0e4e77880b48723a1138e68c7948a153c17f5e9da624209. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 9
| SHA256 hash: | da928ea0a7b11461c0e4e77880b48723a1138e68c7948a153c17f5e9da624209 |
|---|---|
| SHA3-384 hash: | 118989e3bc6fd8ac2b6338004c4e489eb73dd28bc5a0fb6571d5a3163e7cf3204b84cd254f5e82dcdf9746622247c971 |
| SHA1 hash: | 18c9eaadab9fdc67410451eef4a97f803055636c |
| MD5 hash: | 84cf8aa68a850bd458c5b83bd0e44bb5 |
| humanhash: | angel-comet-neptune-shade |
| File name: | 84CF8AA68A850BD458C5B83BD0E44BB5.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 11'534'336 bytes |
| First seen: | 2023-12-17 19:20:13 UTC |
| Last seen: | 2023-12-17 21:21:14 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | a65353a2deef0f99119f0f22f5cd42d2 (1 x RedLineStealer) |
| ssdeep | 24576:NZr8rKcP31k6iHXsjv9G9FO8m7SRcwJHpJKUm5MB2QY31orR3eIIWoGkuv:b8eZl7oxwJJsoO1uihu |
| Threatray | 1'336 similar samples on MalwareBazaar |
| TLSH | T1FEC6C021E3D14437D5336A795D5B52A8AC2ABE212EF9D84A2EF4ED4C0F397803D35293 |
| TrID | 28.1% (.EXE) Win32 Executable Delphi generic (14182/79/4) 25.9% (.SCR) Windows screen saver (13097/50/3) 20.8% (.EXE) Win64 Executable (generic) (10523/12/4) 8.9% (.EXE) Win32 Executable (generic) (4505/5/1) 4.1% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| File icon (PE): | |
| dhash icon | 70cce8696169b2f0 (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
2
# of downloads :
514
Origin country :
NLVendor Threat Intelligence
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Searching for the window
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Launching cmd.exe command interpreter
Creating a process with a hidden window
Launching a process
Using the Windows Management Instrumentation requests
Running batch commands
Creating a process from a recently created file
Creating a file
DNS request
Possible injection to a system process
Enabling autorun by creating a file
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control hook keylogger lolbin replace
Result
Verdict:
MALICIOUS
Verdict:
Unknown
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
Contains functionality to modify clipboard data
Drops PE files with a suspicious file extension
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Drops script at startup location
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Score:
29%
Verdict:
Benign
File Type:
PE
Threat name:
Win32.Trojan.Generic
Status:
Malicious
First seen:
2023-12-16 00:15:18 UTC
File Type:
PE (Exe)
Extracted files:
45
AV detection:
17 of 23 (73.91%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
unknown
Similar samples:
+ 1'326 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
10/10
Tags:
discovery spyware stealer
Behaviour
Enumerates processes with tasklist
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Suspicious use of NtCreateUserProcessOtherParentProcess
Unpacked files
SH256 hash:
49f726559690aee6d88cfb1e775bbcbb53686d5655cb127f334e2bd51e596a54
MD5 hash:
d040e6b89d3e9b6c792c9b4a89549801
SHA1 hash:
995a51ac061716ef7dc327653a90c14c40fb3fc8
Detections:
AutoIT_Compiled
Parent samples :
e7f0e5b269709e0c1038f76d1073bf614308dfc5cac8beb1c2c39d6704eb804d
cdf64a111349a82f90434e360e6312f107a45a6dafa24f8fcddb497e1584ee79
9e56bc168efc43001c19a1720891c88fa4cefb2057b0b38b8c0effaab170e190
cf0c7d8987626b0d2f0115ca56a525762382a4e453365ea740caf733fd8a908e
da928ea0a7b11461c0e4e77880b48723a1138e68c7948a153c17f5e9da624209
e8e307f94d9319f62b20920b93bec8ad8fad2341a3fa1d072a0cd8257295d881
3726fd2adc46647baeedba9144d1fa6e0634c08f55f183fcf4c5e67c763b446a
f6503af4165e558f39c767f7df0c1b28adcd8149d64b5ac810687e1ba53daffb
828cda2143a5d51706f89716c96c8714cdadac696df62a806e566ecead0ed4ce
9120ce3b64b1eea0eccc343744f4e8ff3bdc88b8a79743e07a975c6c313789ee
3830e8249b95e86065288cb7a00ee9139d9e2fd918ff9c7e427e8684c1481579
17eb1a2f794ad5e02a0d96fcbd42fcfe328eb4a10bdda74d8e5cb1dfc46e4fa6
cbb21348582932ab0b31c23529c0cf675ba8b40f85f373d9a33b2853aedd1c16
9410861cbe8204310017cdec72056d49f8effbe26961cc6cb73fee37c731e0a0
267ea6b4497e79e884e06a78dbadb0ac85e7da70987a6230d299b1a3aae2edd1
c97aa2240452b4c1db4ccfbfc783c95d6b47309d5bd389675864d0fc3541b93a
fdb1515e4b51131fe289ea794f76acacb9939416b0905ed9e9e44f0ca60fc805
9bccd2dc8f14b92f591fab90b458da775598de51f9c56dca13ed0561e33eea24
cdf64a111349a82f90434e360e6312f107a45a6dafa24f8fcddb497e1584ee79
9e56bc168efc43001c19a1720891c88fa4cefb2057b0b38b8c0effaab170e190
cf0c7d8987626b0d2f0115ca56a525762382a4e453365ea740caf733fd8a908e
da928ea0a7b11461c0e4e77880b48723a1138e68c7948a153c17f5e9da624209
e8e307f94d9319f62b20920b93bec8ad8fad2341a3fa1d072a0cd8257295d881
3726fd2adc46647baeedba9144d1fa6e0634c08f55f183fcf4c5e67c763b446a
f6503af4165e558f39c767f7df0c1b28adcd8149d64b5ac810687e1ba53daffb
828cda2143a5d51706f89716c96c8714cdadac696df62a806e566ecead0ed4ce
9120ce3b64b1eea0eccc343744f4e8ff3bdc88b8a79743e07a975c6c313789ee
3830e8249b95e86065288cb7a00ee9139d9e2fd918ff9c7e427e8684c1481579
17eb1a2f794ad5e02a0d96fcbd42fcfe328eb4a10bdda74d8e5cb1dfc46e4fa6
cbb21348582932ab0b31c23529c0cf675ba8b40f85f373d9a33b2853aedd1c16
9410861cbe8204310017cdec72056d49f8effbe26961cc6cb73fee37c731e0a0
267ea6b4497e79e884e06a78dbadb0ac85e7da70987a6230d299b1a3aae2edd1
c97aa2240452b4c1db4ccfbfc783c95d6b47309d5bd389675864d0fc3541b93a
fdb1515e4b51131fe289ea794f76acacb9939416b0905ed9e9e44f0ca60fc805
9bccd2dc8f14b92f591fab90b458da775598de51f9c56dca13ed0561e33eea24
SH256 hash:
da928ea0a7b11461c0e4e77880b48723a1138e68c7948a153c17f5e9da624209
MD5 hash:
84cf8aa68a850bd458c5b83bd0e44bb5
SHA1 hash:
18c9eaadab9fdc67410451eef4a97f803055636c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.