MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e189acd674efc58d7d1f34b6b0492a7701b1f6e6ef044397596ddf23a18da3bc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA File information Comments

SHA256 hash: e189acd674efc58d7d1f34b6b0492a7701b1f6e6ef044397596ddf23a18da3bc
SHA3-384 hash: ce769352591781e7304cdf79b27c3913108f486a8ca758825be74c969c9f70c2fb3f75b27cc0d7c69e10a91a47f23986
SHA1 hash: f1c95a5557b9243303ee47adb16a49bfab93d180
MD5 hash: 37d4e414d8fa8f955a55a49a19463b12
humanhash: september-fillet-november-xray
File name:e189acd674efc58d7d1f34b6b0492a7701b1f6e6ef044397596ddf23a18da3bc
Download: download sample
Signature RedLineStealer
File size:1'291'776 bytes
First seen:2023-05-14 18:36:31 UTC
Last seen:2023-05-14 18:48:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader)
ssdeep 24576:Uy0CaqoJexgB6YLM3zBEaqBKEhTgMmv2BBfxAaUznELjs:jlHA6NWZjWZKbLQELj
TLSH T12E55232695E50423D4F90BB04CFA03930734BDA1AE78C76B2B4A5DAA5CB26C1D47277F
TrID 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
3.7% (.EXE) Win64 Executable (generic) (10523/12/4)
2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter JaffaCakes118
Tags:RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
47
Origin country :
GB GB
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
e189acd674efc58d7d1f34b6b0492a7701b1f6e6ef044397596ddf23a18da3bc
Verdict:
Malicious activity
Analysis date:
2023-05-14 20:43:39 UTC
Tags:
rat redline trojan amadey loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a file
Sending a custom TCP request
Launching a service
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a window
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Sending a TCP request to an infection source
Stealing user critical data
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Amadey, RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Amadey bot
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 866138 Sample: 1mKFCrngjq.exe Startdate: 15/05/2023 Architecture: WINDOWS Score: 100 103 Snort IDS alert for network traffic 2->103 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 109 14 other signatures 2->109 12 1mKFCrngjq.exe 1 4 2->12         started        15 oneetx.exe 2->15         started        18 rundll32.exe 2->18         started        process3 file4 83 C:\Users\user\AppData\Local\...\y3769596.exe, PE32 12->83 dropped 85 C:\Users\user\AppData\Local\...\n9047860.exe, PE32 12->85 dropped 20 y3769596.exe 1 4 12->20         started        137 Injects a PE file into a foreign processes 15->137 24 oneetx.exe 15->24         started        signatures5 process6 file7 73 C:\Users\user\AppData\Local\...\y9005069.exe, PE32 20->73 dropped 75 C:\Users\user\AppData\Local\...\m0312600.exe, PE32 20->75 dropped 113 Antivirus detection for dropped file 20->113 115 Multi AV Scanner detection for dropped file 20->115 117 Machine Learning detection for dropped file 20->117 26 y9005069.exe 1 4 20->26         started        30 m0312600.exe 1 20->30         started        signatures8 process9 file10 79 C:\Users\user\AppData\Local\...\l9332361.exe, PE32 26->79 dropped 81 C:\Users\user\AppData\Local\...\k8919043.exe, PE32 26->81 dropped 119 Antivirus detection for dropped file 26->119 121 Multi AV Scanner detection for dropped file 26->121 123 Machine Learning detection for dropped file 26->123 32 l9332361.exe 4 26->32         started        36 k8919043.exe 1 26->36         started        125 Contains functionality to inject code into remote processes 30->125 127 Injects a PE file into a foreign processes 30->127 38 m0312600.exe 3 30->38         started        signatures11 process12 dnsIp13 87 185.161.248.75, 4132, 49702 NTLGB United Kingdom 32->87 91 Antivirus detection for dropped file 32->91 93 Multi AV Scanner detection for dropped file 32->93 95 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 32->95 101 2 other signatures 32->101 97 Machine Learning detection for dropped file 36->97 99 Injects a PE file into a foreign processes 36->99 41 k8919043.exe 36->41         started        77 C:\Users\user\AppData\Local\...\oneetx.exe, PE32 38->77 dropped 43 oneetx.exe 38->43         started        file14 signatures15 process16 signatures17 46 WerFault.exe 23 11 41->46         started        129 Antivirus detection for dropped file 43->129 131 Multi AV Scanner detection for dropped file 43->131 133 Machine Learning detection for dropped file 43->133 135 2 other signatures 43->135 48 oneetx.exe 43->48         started        process18 dnsIp19 89 77.91.124.20, 49704, 49705, 49706 ECOTEL-ASRU Russian Federation 48->89 69 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 48->69 dropped 71 C:\Users\user\AppData\Local\...\clip64[1].dll, PE32 48->71 dropped 111 Creates an undocumented autostart registry key 48->111 53 cmd.exe 48->53         started        55 schtasks.exe 48->55         started        57 rundll32.exe 48->57         started        file20 signatures21 process22 process23 59 conhost.exe 53->59         started        61 cmd.exe 53->61         started        63 cacls.exe 53->63         started        67 4 other processes 53->67 65 conhost.exe 55->65         started       
Threat name:
ByteCode-MSIL.Trojan.RedLineStealer
Status:
Malicious
First seen:
2023-05-14 18:37:58 UTC
File Type:
PE (Exe)
Extracted files:
114
AV detection:
20 of 24 (83.33%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:doma botnet:fuga discovery infostealer persistence spyware stealer
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of UnmapMainImage
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
RedLine
Malware Config
C2 Extraction:
185.161.248.75:4132
Unpacked files
SH256 hash:
b33796dbe2d17f89db37315573f7c2d01429e13ea4e81babf8aaa534709badb5
MD5 hash:
e9ff81feefc790bef5f73aafb7ecf56b
SHA1 hash:
c513170ae947dd8364c822e1d929b6519e22e8d2
SH256 hash:
9e7c8a44042b2dbd7473729f5d94fc0d758d755172963f9fd8253d979fc9f963
MD5 hash:
af426a4ce759ecdc44104510c58bae41
SHA1 hash:
0165f077f856254f6253d0810f4d7aecd06ef322
Detections:
redline
SH256 hash:
e4bae5771ac74a9b72750413eb8d997e8e988cd45daf1304e38fa6b471ac9801
MD5 hash:
967de43d47c80baa290f88c11a527dec
SHA1 hash:
40f47e47940032635d34e8c273e53fa96f315801
SH256 hash:
a3e5e4417dc8310024cef232f6b790553881644e8690d4657b0b6b6bb21b11a1
MD5 hash:
541b0d7d538159114a15853107913eb9
SHA1 hash:
1c8e5bedb71e449ed7ec86b10e73d368b405751b
SH256 hash:
e189acd674efc58d7d1f34b6b0492a7701b1f6e6ef044397596ddf23a18da3bc
MD5 hash:
37d4e414d8fa8f955a55a49a19463b12
SHA1 hash:
f1c95a5557b9243303ee47adb16a49bfab93d180
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments