MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 dcb59ed473432e8eef60258c0be54aca0b362e43bc531172c70584ab9984d768. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments 1

SHA256 hash: dcb59ed473432e8eef60258c0be54aca0b362e43bc531172c70584ab9984d768
SHA3-384 hash: 06329b78f3cb11ae038c5ca4dd142b46cadd49a659695ccab34150a46965f415359c80fb7c62041be76b03540d1170c8
SHA1 hash: cf9b4c9690381f1b8bf0c3183401ffe49066cfa2
MD5 hash: e4f3121c9c984254e02674559a9b34cf
humanhash: princess-fix-tennis-freddie
File name:e4f3121c9c984254e02674559a9b34cf
Download: download sample
Signature RedLineStealer
File size:364'544 bytes
First seen:2021-09-09 01:54:58 UTC
Last seen:2021-09-09 03:22:32 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 96b0c0b056f44468723aefb84fe936ee (6 x Stop, 5 x RedLineStealer, 3 x RaccoonStealer)
ssdeep 6144:xb/q+JN+JiEaJc1u+KD29kif53MoMVikawLj737Nh:lq+J4JiEaJc1uBw3+owawX737Nh
Threatray 2'198 similar samples on MalwareBazaar
TLSH T1CA749E30BAE0D83DE1B751B446B5C3B8A52A7EB19B3050CB72E53AEE56305E59C30B47
dhash icon 9824e7d0c4e72158 (35 x RedLineStealer, 23 x Smoke Loader, 14 x ArkeiStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
111
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e4f3121c9c984254e02674559a9b34cf
Verdict:
Malicious activity
Analysis date:
2021-09-09 01:57:41 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Connection attempt
Sending a custom TCP request
Creating a file
Connection attempt to an infection source
Sending a TCP request to an infection source
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-09-09 01:55:07 UTC
AV detection:
19 of 45 (42.22%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:uhd_888 discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.119:15548
Unpacked files
SH256 hash:
65b77ac6a8f2249aafe505448a90450bf07e5f2a4682fa2f7c777ab884a67591
MD5 hash:
b3755ef650c25757664e42d20571f779
SHA1 hash:
f2f6ed658dfe816f84f22f564ddb2060556e49be
SH256 hash:
d6a09449292eb508a5cac09e3f5c3f1113ba73460b8e1b500fc1eda04a440b87
MD5 hash:
42ba412a88868811d4f8cdc9f6b576a9
SHA1 hash:
b2a1d3a2cddbaecfd80ea78f492f7ff0fa8ca13b
SH256 hash:
b2c3c7b0ed7a088566a43edcf6226e6a14eeac48ea74866cf9fa533aa085a736
MD5 hash:
a49c58211f69c0617eb99f129e4d6cf2
SHA1 hash:
a18526bf8953b6034809436462bbe15a3509f5f1
SH256 hash:
dcb59ed473432e8eef60258c0be54aca0b362e43bc531172c70584ab9984d768
MD5 hash:
e4f3121c9c984254e02674559a9b34cf
SHA1 hash:
cf9b4c9690381f1b8bf0c3183401ffe49066cfa2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe dcb59ed473432e8eef60258c0be54aca0b362e43bc531172c70584ab9984d768

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-09 01:54:59 UTC

url : hxxp://185.215.113.119/current.exe