MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1d0d84da1aa8f1f7292960498b7b685d568d6392e6babd357356800f61ae61d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 1 File information Comments 1

SHA256 hash: e1d0d84da1aa8f1f7292960498b7b685d568d6392e6babd357356800f61ae61d
SHA3-384 hash: 0a423809a8ff1f8b698974519fcf47100db4e9cbdcaeba16126b6773b1abc803eda09927c97c596d83a469073f8552f8
SHA1 hash: dd5f136429bf94f4e8c72e977881324163a4086b
MD5 hash: ebef6f629d4dd92f8c4714b4f9693642
humanhash: enemy-jupiter-kansas-butter
File name:ebef6f629d4dd92f8c4714b4f9693642
Download: download sample
Signature RedLineStealer
File size:515'072 bytes
First seen:2022-11-20 08:37:21 UTC
Last seen:2023-08-24 16:40:50 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash bf5a4aa99e5b160f8521cadd6bfe73b8 (434 x RedLineStealer, 31 x AgentTesla, 12 x DCRat)
ssdeep 12288:qh1Lk70Tnvjc3bVFmbubJhdwe10ZC8CnVR6apaw8eLsmHE:Ok70TrcrTOu3z10aVR6apaw8mk
Threatray 4'571 similar samples on MalwareBazaar
TLSH T104B4022135D0D173C576113144E6CB7A9D69B4224B7AA2C7BF8E2BBA6F113D0E33A1C9
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
487
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
ebef6f629d4dd92f8c4714b4f9693642
Verdict:
Malicious activity
Analysis date:
2022-11-20 08:38:32 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Using the Windows Management Instrumentation requests
Sending a custom TCP request
Reading critical registry keys
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-11-20 08:38:08 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
19 of 26 (73.08%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
be92f2b9c8a972b9ab57af03492208103528de96d83b0b7e161f2a6bc7995e2d
MD5 hash:
4eb5090d9b387d13a15a7bee94838da6
SHA1 hash:
cb9efd14a9fa3ec4b11d29ccd90ac36e365e594b
SH256 hash:
680887f76a85622b167a658870e5be611d1dc1ca7ba140b0405564ce8f716647
MD5 hash:
9c4080d927576b0bd8a63bed0e039c23
SHA1 hash:
848bd476a02fc4c0061a3b3d688ec5b8bd1d5af8
SH256 hash:
588394e2245d81128c9949b5d510ee8c3016c19089f2ee4ced292cd9886594a2
MD5 hash:
1a6aba1dd862152d19def1c8d783fc2d
SHA1 hash:
4d8282a1093edbeb1c66fba0f43aca3402b7199a
SH256 hash:
41909314041e14dd02dcb8b801bfb8c3366858d60c7ed3a8641eb4f3a225a0dc
MD5 hash:
f97f401f447b1f66612eb719ec366bbe
SHA1 hash:
155cdaaf42c739588aa1fe718c3cf24494084de0
SH256 hash:
e1d0d84da1aa8f1f7292960498b7b685d568d6392e6babd357356800f61ae61d
MD5 hash:
ebef6f629d4dd92f8c4714b4f9693642
SHA1 hash:
dd5f136429bf94f4e8c72e977881324163a4086b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe e1d0d84da1aa8f1f7292960498b7b685d568d6392e6babd357356800f61ae61d

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-11-20 08:37:24 UTC

url : hxxp://cityoftransformation.com/16/data64_1.exe