MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e9d3473f5093679f5cfd91de7bec0b7388fb7986ba0c3d7cdd5e8bca14236516. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 2 File information Comments 1

SHA256 hash: e9d3473f5093679f5cfd91de7bec0b7388fb7986ba0c3d7cdd5e8bca14236516
SHA3-384 hash: c7a61027a106850b7e4a0be941ec25097c29368516f3657834daf339e3ae90f551c634774e6a1d939f0a2d448362db97
SHA1 hash: c9270d36a94ca875b489813e37383c68d9855cda
MD5 hash: 53d261cb3f1ec4e8462a021979e4f2b2
humanhash: lima-alabama-lithium-massachusetts
File name:53d261cb3f1ec4e8462a021979e4f2b2
Download: download sample
Signature RedLineStealer
File size:5'700'912 bytes
First seen:2021-11-09 22:24:47 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 172750858dcc0719eed08c952858023c (117 x RedLineStealer, 3 x N-W0rm, 1 x AsyncRAT)
ssdeep 98304:dB5iZlwoGdP+ZBkBih1qSZ2p57nJB1ZR1jnmE2xxf6YHKOtpQf:8ZlJGQuihPZ27J1vmE2xxdXQf
Threatray 14 similar samples on MalwareBazaar
TLSH T1D5462373A7740189D4D7C83A8537FDE131F21B779A82A87556CABAC22B325D0E217B07
File icon (PE):PE icon
dhash icon 046270e4f4b07004 (6 x RedLineStealer, 2 x CoinMiner, 1 x Formbook)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.81.224.230:5684 https://threatfox.abuse.ch/ioc/246293/

Intelligence


File Origin
# of uploads :
1
# of downloads :
130
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Detected VMProtect packer
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect virtualization through RDTSC time measurements
Tries to evade analysis by execution special instruction which cause usermode exception
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Bulz
Status:
Malicious
First seen:
2021-11-09 22:25:05 UTC
AV detection:
21 of 45 (46.67%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer vmprotect
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of NtSetInformationThreadHideFromDebugger
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
VMProtect packed file
RedLine
RedLine Payload
Unpacked files
SH256 hash:
5fa0e530341120c72934d8c23a69ca35e7eb1b69d10eaea16737966ca02c8dfd
MD5 hash:
99ec575344f9d54bff49716f750550a4
SHA1 hash:
fc7fc6bf5e8cf8fde46ee1902c3b8af491f356be
SH256 hash:
243cd793ea1430b3fda5928d41f1c91bc2703c36bf7c842f72b9602cb2fd1569
MD5 hash:
c617130597cf5c575f8e8b69413bc0cb
SHA1 hash:
1f997967dffb77e8dd65587da4ed40ef579c8920
SH256 hash:
12b94880283dae218c8211c933ef47c64a79824cedbef872bd339b599a49b5ef
MD5 hash:
3b87d4df019c8727c601604fde4355f3
SHA1 hash:
eacd7fc9e79820391f10d7c27b26448e9881a0f2
SH256 hash:
e9d3473f5093679f5cfd91de7bec0b7388fb7986ba0c3d7cdd5e8bca14236516
MD5 hash:
53d261cb3f1ec4e8462a021979e4f2b2
SHA1 hash:
c9270d36a94ca875b489813e37383c68d9855cda
Malware family:
RedLine
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_EXE_Packed_VMProtect
Author:ditekSHen
Description:Detects executables packed with VMProtect.
Rule name:INDICATOR_KB_CERT_0be3f393d1ef0272aed0e2319c1b5dd0
Author:ditekSHen
Description:Detects executables signed with stolen, revoked or invalid certificates

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe e9d3473f5093679f5cfd91de7bec0b7388fb7986ba0c3d7cdd5e8bca14236516

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-11-09 22:24:48 UTC

url : hxxp://f0597884.xsph.ru/ads.exe