MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e6df2c624182ed1a042693570094f4b73962b0d43ecaffaf5eb045948f3c8f58. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 23 File information Comments

SHA256 hash: e6df2c624182ed1a042693570094f4b73962b0d43ecaffaf5eb045948f3c8f58
SHA3-384 hash: 4b11c104339c79b26bac683caabce7d64c992295737a564ad63fa8261155d34502f9fd6a31e04ac95d7460052e97ffe9
SHA1 hash: 759035391e08aafe8f4f7a4b0005388137b34edc
MD5 hash: 23ae96501f126d3b38b1bedf18bfbea3
humanhash: fifteen-delaware-nine-hawaii
File name:23ae96501f126d3b38b1bedf18bfbea3.exe
Download: download sample
Signature RedLineStealer
File size:6'144 bytes
First seen:2023-05-10 13:40:40 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'740 x AgentTesla, 19'597 x Formbook, 12'241 x SnakeKeylogger)
ssdeep 48:67lzmldOWI5yAHN39fK0FplFcXJhyPFlL/J3th+kYvd4Yg63gp6cOulavTqXSfbi:YEOIQNVjrXcWD7RtwkYv1Yp7svNzNt
TLSH T1F2C1C60AB7D49636D4BE4B3404B3831062BDF6429E279F0E1CE402DEBF2A774C556AD1
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
23.226.129.17:20619

Intelligence


File Origin
# of uploads :
1
# of downloads :
260
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
a.exe
Verdict:
Malicious activity
Analysis date:
2023-05-06 14:26:40 UTC
Tags:
opendir loader evasion rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive fingerprint packed stealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Amadey, Lokibot, NSISDropper, RedLine, S
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large strings
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Drops PE files to the startup folder
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Amadeys stealer DLL
Yara detected aPLib compressed binary
Yara detected Generic Downloader
Yara detected Lokibot
Yara detected NSISDropper
Yara detected RedLine Stealer
Yara detected SystemBC
Yara detected Xmrig cryptocurrency miner
Yara detected XWorm
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 863055 Sample: Tf5uK0T3bj.exe Startdate: 10/05/2023 Architecture: WINDOWS Score: 100 111 Found malware configuration 2->111 113 Malicious sample detected (through community Yara rule) 2->113 115 Antivirus detection for URL or domain 2->115 117 25 other signatures 2->117 8 Tf5uK0T3bj.exe 14 57 2->8         started        12 rundll32.exe 2->12         started        14 rundll32.exe 2->14         started        16 WindowsApp6.exe 2->16         started        process3 dnsIp4 105 77.91.124.20 ECOTEL-ASRU Russian Federation 8->105 107 62.171.178.45 CONTABODE United Kingdom 8->107 109 35 other IPs or domains 8->109 81 C:\Users\user\Desktop\a\yfpqyf6z34gx4.exe, PE32 8->81 dropped 83 C:\Users\user\Desktop\a\xmrig.exe, PE32+ 8->83 dropped 85 C:\Users\user\Desktop\a\xmine.exe, PE32+ 8->85 dropped 87 59 other malicious files 8->87 dropped 18 photo_570.exe 8->18         started        21 CCleaner.exe 8->21         started        23 vbc (2).exe 54 8->23         started        27 11 other processes 8->27 file5 process6 dnsIp7 63 C:\Users\user\AppData\Local\...\v8985416.exe, PE32 18->63 dropped 65 C:\Users\user\AppData\Local\...\d7259254.exe, PE32 18->65 dropped 29 v8985416.exe 18->29         started        67 C:\Users\user\AppData\...\ccsetup611.exe, PE32 21->67 dropped 69 C:\Users\user\AppData\Local\...\Service.exe, PE32+ 21->69 dropped 33 wscript.exe 21->33         started        101 185.246.220.85 LVLT-10753US Germany 23->101 71 C:\Users\user\AppData\...\B52B3F.exe (copy), PE32 23->71 dropped 119 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 23->119 121 Tries to steal Mail credentials (via file / registry access) 23->121 123 Tries to harvest and steal ftp login credentials 23->123 125 Tries to harvest and steal browser information (history, passwords, etc) 23->125 103 148.251.236.201 HETZNER-ASDE Germany 27->103 73 C:\Users\user\AppData\Roaming\yBjeTclr.exe, PE32 27->73 dropped 75 C:\Users\user\AppData\...\WindowsApp6.exe, PE32 27->75 dropped 77 C:\Users\user\AppData\Local\...\tlvzjfo.dll, PE32 27->77 dropped 79 C:\Users\user\AppData\...\applauncheerrr.exe, PE32 27->79 dropped 127 Multi AV Scanner detection for dropped file 27->127 129 Drops PE files to the startup folder 27->129 131 Writes to foreign memory regions 27->131 133 3 other signatures 27->133 35 vbc (2).exe 27->35         started        37 WerFault.exe 27->37         started        40 WerFault.exe 27->40         started        42 6 other processes 27->42 file8 signatures9 process10 dnsIp11 89 C:\Users\user\AppData\Local\...\b2082185.exe, PE32 29->89 dropped 91 C:\Users\user\AppData\Local\...\a8793524.exe, PE32 29->91 dropped 143 Antivirus detection for dropped file 29->143 145 Machine Learning detection for dropped file 29->145 44 a8793524.exe 9 1 29->44         started        47 b2082185.exe 29->47         started        49 Service.exe 33->49         started        52 explorer.exe 35->52 injected 95 20.42.73.29 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 37->95 97 192.168.2.1 unknown unknown 37->97 99 20.189.173.22 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 40->99 file12 signatures13 process14 dnsIp15 135 Antivirus detection for dropped file 44->135 137 Machine Learning detection for dropped file 44->137 139 Disable Windows Defender notifications (registry) 44->139 141 Disable Windows Defender real time protection (registry) 44->141 55 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 49->55 dropped 57 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 49->57 dropped 59 C:\Users\user\AppData\Local\...\python39.dll, PE32+ 49->59 dropped 61 9 other malicious files 49->61 dropped 93 188.114.96.7 CLOUDFLARENETUS European Union 52->93 file16 signatures17
Threat name:
ByteCode-MSIL.Trojan.Heracles
Status:
Malicious
First seen:
2023-05-06 17:38:47 UTC
File Type:
PE (.Net Exe)
Extracted files:
1
AV detection:
20 of 37 (54.05%)
Threat level:
  5/5
Result
Malware family:
systembc
Score:
  10/10
Tags:
family:agenttesla family:lgoogloader family:lokibot family:redline family:sectoprat family:systembc botnet:06.05 youtube botnet:cheat botnet:lux3 botnet:mauga collection discovery downloader evasion infostealer keylogger persistence pyinstaller rat spyware stealer trojan
Behaviour
Creates scheduled task(s)
Modifies registry class
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Detects Pyinstaller
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Uses the VBS compiler for execution
Windows security modification
Downloads MZ/PE file
Sets service image path in registry
AgentTesla
Detects LgoogLoader payload
LgoogLoader
Lokibot
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
SectopRAT
SectopRAT payload
SystemBC
Malware Config
C2 Extraction:
148.251.236.201:443
194.87.151.202:9578
http://185.246.220.85/fresh/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
23.226.129.17:20619
217.196.96.102:4132
176.123.9.142:14845
https://api.telegram.org/bot6014676296:AAHxuWZXqY8bUcQ2pv4pgUzoljef3z45sCM/
Unpacked files
SH256 hash:
e6df2c624182ed1a042693570094f4b73962b0d43ecaffaf5eb045948f3c8f58
MD5 hash:
23ae96501f126d3b38b1bedf18bfbea3
SHA1 hash:
759035391e08aafe8f4f7a4b0005388137b34edc
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:HeavensGate
Author:kevoreilly
Description:Heaven's Gate: Switch from 32-bit to 64-mode
Rule name:INDICATOR_EXE_Packed_ConfuserEx
Author:ditekSHen
Description:Detects executables packed with ConfuserEx Mod
Rule name:INDICATOR_SUSPICIOUS_Binary_References_Browsers
Author:ditekSHen
Description:Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients
Author:ditekSHen
Description:Detects executables referencing many file transfer clients. Observed in information stealers
Rule name:INDICATOR_SUSPICIOUS_GENInfoStealer
Author:ditekSHen
Description:Detects executables containing common artifcats observed in infostealers
Rule name:infostealer_loki
Rule name:infostealer_xor_patterns
Author:jeFF0Falltrades
Description:The XOR and string patterns shown here appear to be unique to certain information-stealing malware families, namely LokiBot and Pony/Fareit. The XOR patterns were observed in a several loaders and payloads for LokiBot, but have also appeared (less frequently) in Pony/Fareit loaders and samples. The two accompanying rules below can be used to further classify the final payloads.
Rule name:Loki
Author:kevoreilly
Description:Loki Payload
Rule name:LokiBot
Author:kevoreilly
Description:LokiBot Payload
Rule name:malware_Lokibot_strings
Author:JPCERT/CC Incident Response Group
Description:detect Lokibot in memory
Reference:internal research
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MSIL_TinyDownloader_Generic
Author:albertzsigovits
Description:Detects small-sized dotNET downloaders
Rule name:pe_imphash
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Start2__bin
Author:James_inthe_box
Description:SystemBC
Reference:7bd341488dc6f01a6662ac478d67d3cd8211cbf362994355027b5bdf573cc31e
Rule name:STEALER_Lokibot
Author:Marc Rivero | McAfee ATR Team
Description:Rule to detect Lokibot stealer
Rule name:SystemBC_Socks
Author:@bartblaze
Description:Identifies SystemBC RAT, Socks proxy version.
Rule name:Windows_Trojan_Lokibot_0f421617
Author:Elastic Security
Rule name:Windows_Trojan_Lokibot_1f885282
Author:Elastic Security
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security
Rule name:win_lokipws_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.lokipws.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments