MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 df462937835934f9edafab767c440457a7416ccc2791955db97d4714a406d5ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 1 File information Comments 1

SHA256 hash: df462937835934f9edafab767c440457a7416ccc2791955db97d4714a406d5ce
SHA3-384 hash: 37875713caafbcc3a72143cede1360e05dcaf251f68cb36cd31585d30cdf55480b5dabb570ded60b077109b0bf97834f
SHA1 hash: 2709496b7205c9d10c28c5e069879e95db236a5a
MD5 hash: a4a306682bf75b4976c3441f5151db97
humanhash: mockingbird-white-east-cup
File name:a4a306682bf75b4976c3441f5151db97
Download: download sample
Signature RedLineStealer
File size:359'936 bytes
First seen:2021-08-01 12:06:43 UTC
Last seen:2021-08-01 12:33:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash c8b9c145ec19b60e1b1e5259a226415a (2 x RedLineStealer, 1 x TeamBot, 1 x Stop)
ssdeep 6144:4CajGoQi5Vzdze6SYCYgDKviJuraE7qCGEYIM:wDB5VBSYd+K6JoORE
Threatray 4'150 similar samples on MalwareBazaar
TLSH T1C574F1113681C472E36109304865CBA02B79FCB19D784607B75867EF6EF33F1AA7AE46
dhash icon 4839b2b4e8c38890 (137 x RaccoonStealer, 37 x Smoke Loader, 30 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'015
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a4a306682bf75b4976c3441f5151db97
Verdict:
Suspicious activity
Analysis date:
2021-08-01 12:09:15 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a window
Creating a file
Sending a UDP request
Connection attempt to an infection source
Stealing user critical data
Sending an HTTP POST request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Potential time zone aware malware
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-08-01 10:36:31 UTC
AV detection:
19 of 28 (67.86%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:mix 01.08 infostealer
Behaviour
Suspicious use of AdjustPrivilegeToken
RedLine
RedLine Payload
Malware Config
C2 Extraction:
185.215.113.17:18597
Unpacked files
SH256 hash:
7da9fa901d5f4f0832ac3e2fe35ff534798f52aa2b9f0618092ed25365209c29
MD5 hash:
b9b9b1d8916b368f5a99c181fc7720e3
SHA1 hash:
8bc159a49fee483766e6efcfda1dfbd7b975d51c
SH256 hash:
c065b2313dc467dda180d74e13d0bb8dc4c75988cd2f399a317bd4391cb1ee08
MD5 hash:
1fd0771cda67f05c3ce6fa84cf9e663f
SHA1 hash:
4200a82c5a5368b21c0d9ba3997d2da8c95a1207
SH256 hash:
e94199b77b83b913fa595a1cd98b7173b3b2faabe52eb5797354ef4f7551a76f
MD5 hash:
a56d4ba64da99b48bef44a8d5b5dcd18
SHA1 hash:
3b4c5a0e1396946ff34aa233bac1e5256c68aae5
SH256 hash:
df462937835934f9edafab767c440457a7416ccc2791955db97d4714a406d5ce
MD5 hash:
a4a306682bf75b4976c3441f5151db97
SHA1 hash:
2709496b7205c9d10c28c5e069879e95db236a5a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe df462937835934f9edafab767c440457a7416ccc2791955db97d4714a406d5ce

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-08-01 12:06:44 UTC

url : hxxp://dahgarq.top/jolion/apines.exe