MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e7f968d64655db242cdc6330cf399c3b5e635b63b2ba734d5e2c2eee5986e9be. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 12
| SHA256 hash: | e7f968d64655db242cdc6330cf399c3b5e635b63b2ba734d5e2c2eee5986e9be |
|---|---|
| SHA3-384 hash: | d610e80ba4b9016987016538d0b1c623e9a331f835483580bda7a1c6c2c2618fcc43b2dba4d0729fcaea6193b622406e |
| SHA1 hash: | 2180d6f65a664f71c85762a3c4c5db7163b66c73 |
| MD5 hash: | 5903b4d5a7cbd5816d4a9128cb69570b |
| humanhash: | four-west-diet-edward |
| File name: | 5903b4d5a7cbd5816d4a9128cb69570b.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'466'880 bytes |
| First seen: | 2022-11-09 19:22:35 UTC |
| Last seen: | 2022-11-09 20:50:48 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e8b67e9793f407b21796b58d9b2b1faf (10 x RedLineStealer, 1 x Smoke Loader, 1 x RecordBreaker) |
| ssdeep | 24576:9jahaFL5GiByK/RMAs5WHi044+yO0VrVdvGUhdVlfNukuc5WEnzW/GC1eR9rmAzd:9+h2L5GiByK/+Azi04nyrVrnzblfkhgb |
| TLSH | T1C06523923CD0C472C3AE9935003581B2B639E6B3DF42FD5BEA659E512E3A7D38207719 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
2
# of downloads :
235
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
remcos
ID:
1
File name:
5903b4d5a7cbd5816d4a9128cb69570b.exe
Verdict:
Malicious activity
Analysis date:
2022-11-09 19:23:08 UTC
Tags:
rat remcos trojan redline raccoon recordbreaker keylogger guloader loader stealer
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Launching a process
Searching for synchronization primitives
Сreating synchronization primitives
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %temp% directory
Creating a process from a recently created file
Creating a window
Creating a file
Moving a recently created file
Creating a process with a hidden window
Unauthorized injection to a system process
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
greyware packed redline zusy
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Verdict:
Unknown
Result
Threat name:
Eternity Worm, Raccoon Stealer v2, RedLi
Detection:
malicious
Classification:
rans.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Found Tor onion address
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies existing user documents (likely ransomware behavior)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Eternity Worm
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Remcos RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-11-08 17:03:29 UTC
File Type:
PE (Exe)
AV detection:
29 of 40 (72.50%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
remcos
raccoon
Result
Malware family:
remcos
Score:
10/10
Tags:
family:eternity family:redline family:remcos botnet:remotehost infostealer persistence rat spyware
Behaviour
Modifies registry class
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks QEMU agent file
Checks computer location settings
Loads dropped DLL
Uses the VBS compiler for execution
Blocklisted process makes network request
Downloads MZ/PE file
Executes dropped EXE
Eternity
RedLine
RedLine payload
Remcos
Malware Config
C2 Extraction:
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
157.90.145.151:1441
157.90.145.151:14075
157.90.145.151:1441
157.90.145.151:14075
Unpacked files
SH256 hash:
e7f968d64655db242cdc6330cf399c3b5e635b63b2ba734d5e2c2eee5986e9be
MD5 hash:
5903b4d5a7cbd5816d4a9128cb69570b
SHA1 hash:
2180d6f65a664f71c85762a3c4c5db7163b66c73
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.