MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 de1f0fd799400e19b3861700ccbf709ca7f4868571a211ddaae754420ce8a128. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs YARA 4 File information Comments

SHA256 hash: de1f0fd799400e19b3861700ccbf709ca7f4868571a211ddaae754420ce8a128
SHA3-384 hash: f275fb090cf00781ffbd91ec15cc6387ff496850b6e0c449b1f3aa733c3f3c4d7a991e702c3548d728845990c53ae08b
SHA1 hash: e87acf073ff2dc8b046ac2ae8a2496af1d6fc98a
MD5 hash: cf2788629959d897c9579e973b15a5d1
humanhash: sweet-rugby-freddie-early
File name:cf2788629959d897c9579e973b15a5d1.exe
Download: download sample
Signature RedLineStealer
File size:70'656 bytes
First seen:2021-10-03 12:29:48 UTC
Last seen:2021-10-03 14:14:26 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'602 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 1536:7ubtvCRNrIdViwWXvTMmQ5tZGCotMKOH+:7ovCRNrIVW7MmQHEPB
Threatray 94 similar samples on MalwareBazaar
TLSH T16063B4B7406154A6C5492334E4B10F0B7ABCD6351980B698F44FF2EAEC1D69D9EF83B8
File icon (PE):PE icon
dhash icon e7b3b346abbb2e72 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
cf2788629959d897c9579e973b15a5d1.exe
Verdict:
Malicious activity
Analysis date:
2021-10-03 12:31:33 UTC
Tags:
stealer trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Launching a service
Creating a window
Connection attempt to an infection source
Sending a TCP request to an infection source
Query of malicious DNS domain
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
obfuscated packed
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Hides threads from debuggers
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 495846 Sample: eoaz5rOxnp.exe Startdate: 03/10/2021 Architecture: WINDOWS Score: 100 64 Multi AV Scanner detection for submitted file 2->64 66 Yara detected RedLine Stealer 2->66 68 PE file contains section with special chars 2->68 70 PE file has nameless sections 2->70 7 eoaz5rOxnp.exe 15 8 2->7         started        12 WinHoster.exe 2->12         started        process3 dnsIp4 44 iplogger.org 88.99.66.31, 443, 49724, 49725 HETZNER-ASDE Germany 7->44 46 onepremiumstore.bar 172.67.214.80, 443, 49714, 49717 CLOUDFLARENETUS United States 7->46 48 auto-repair-solutions.bar 7->48 36 C:\Users\user\AppData\Roaming\8862015.scr, PE32 7->36 dropped 38 C:\Users\user\AppData\Roaming\7002448.scr, PE32 7->38 dropped 40 C:\Users\user\AppData\Roaming\4770186.scr, PE32 7->40 dropped 42 2 other malicious files 7->42 dropped 72 Detected unpacking (changes PE section rights) 7->72 74 May check the online IP address of the machine 7->74 76 Drops PE files with a suspicious file extension 7->76 14 4770186.scr 7->14         started        18 8862015.scr 14 25 7->18         started        20 1874582.scr 7->20         started        22 2 other processes 7->22 file5 signatures6 process7 dnsIp8 50 178.63.26.132, 29795, 49733 HETZNER-ASDE Germany 14->50 52 api.ip.sb 14->52 80 Multi AV Scanner detection for dropped file 14->80 82 Detected unpacking (changes PE section rights) 14->82 84 Query firmware table information (likely to detect VMs) 14->84 94 3 other signatures 14->94 25 conhost.exe 14->25         started        54 94.140.112.88, 49732, 81 TELEMACHBroadbandAccessCarrierServicesSI Latvia 18->54 56 api.ip.sb 18->56 86 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 18->86 88 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 18->88 90 Tries to steal Crypto Currency Wallets 18->90 27 conhost.exe 18->27         started        58 newbestpewpewcompany.com 172.67.130.64, 443, 49730 CLOUDFLARENETUS United States 20->58 60 192.168.2.1 unknown unknown 20->60 92 Tries to harvest and steal browser information (history, passwords, etc) 20->92 62 the-lead-bitter.com 172.67.160.101, 443, 49719 CLOUDFLARENETUS United States 22->62 34 C:\Users\user\AppData\...\WinHoster.exe, PE32 22->34 dropped 29 WinHoster.exe 2 22->29         started        32 conhost.exe 22->32         started        file9 signatures10 process11 signatures12 78 Multi AV Scanner detection for dropped file 29->78
Threat name:
ByteCode-MSIL.Infostealer.ClipBanker
Status:
Malicious
First seen:
2021-10-03 11:26:00 UTC
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
discovery evasion persistence spyware stealer themida trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies system certificate store
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Legitimate hosting services abused for malware hosting/C2
Checks BIOS information in registry
Reads user/profile data of web browsers
Themida packer
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Unpacked files
SH256 hash:
4be751977b19db8d89fb8c9816ca6e4156148c947bd93346c299828800dd49fa
MD5 hash:
b468183fd0470829e0f4c8305112b088
SHA1 hash:
337b8409fe41c88255bb8f5fad935e3ed4e9c2ef
SH256 hash:
de1f0fd799400e19b3861700ccbf709ca7f4868571a211ddaae754420ce8a128
MD5 hash:
cf2788629959d897c9579e973b15a5d1
SHA1 hash:
e87acf073ff2dc8b046ac2ae8a2496af1d6fc98a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:pe_imphash
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe de1f0fd799400e19b3861700ccbf709ca7f4868571a211ddaae754420ce8a128

(this sample)

  
Delivery method
Distributed via web download

Comments