MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eeafeaa06f77c3fcedafcf46dcb18a8c0b931dcb4696319bb94b191eb0c9417a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 1 File information Comments

SHA256 hash: eeafeaa06f77c3fcedafcf46dcb18a8c0b931dcb4696319bb94b191eb0c9417a
SHA3-384 hash: 3ca650ee404bd3171218afccfc862d729ac91321c7801c9457ab9fda4e0147e31fa2d6f2aedd3d3342a21169c3de7127
SHA1 hash: a3d7ce8dfd2b9e98ee7150b8a1c819173e0ace33
MD5 hash: c90cfc40ca06bf087ad22d7fb7fab278
humanhash: connecticut-nuts-don-quiet
File name:c90cfc40ca06bf087ad22d7fb7fab278.exe
Download: download sample
Signature RedLineStealer
File size:357'888 bytes
First seen:2021-06-09 15:41:05 UTC
Last seen:2021-06-09 16:59:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6c073e6a8ba68224cd3b694cbab6f2b2 (1 x ArkeiStealer, 1 x DanaBot, 1 x RedLineStealer)
ssdeep 6144:8W94Io+CevVDdunO6IWlTWnFrBRTmJWE/rSJHXanj0cRF9fh7/CJVII:8O41+CYVDEIWlTiFfmsE/rSknjX7/X
Threatray 2'485 similar samples on MalwareBazaar
TLSH 4D74AE10B7E0C034F6F326F45A7592B9A93E7AB1A73490CF52D126EA5A346E0EC31357
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
141.136.0.145:80

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
141.136.0.145:80 https://threatfox.abuse.ch/ioc/84759/

Intelligence


File Origin
# of uploads :
2
# of downloads :
305
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
DNS request
Sending a custom TCP request
Creating a window
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Creating a file
Connection attempt to an infection source
Stealing user critical data
Sending an HTTP POST request to an infection source
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Graftor
Status:
Malicious
First seen:
2021-06-09 15:41:09 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
15 of 28 (53.57%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
phereramila.xyz:80
Unpacked files
SH256 hash:
932a8381cd7f028064e66f364f690a428eb94d12dbb3890cceddcedca99c87a3
MD5 hash:
bfab246c099f091501b1ce29971e793c
SHA1 hash:
e9840ccafcb409c6ee3e3d6dcc4334c6608c5993
SH256 hash:
ab2f3022ec6828dd159be754290b6f27477be5357f9fb457658b23abd54c0345
MD5 hash:
18626aa02a26e4dd8d19a5dfe5785703
SHA1 hash:
a7609e88b7fb297655051b75790e06b01fdd6512
SH256 hash:
9a889c27f0c65322f40a41e30a975cf4789e864f932c0260463014f482492dd4
MD5 hash:
c6600cb4b754dca157fb7891d3e2a70f
SHA1 hash:
17168befa2ea5c6ac8c2c43527fa00db284a6c29
SH256 hash:
eeafeaa06f77c3fcedafcf46dcb18a8c0b931dcb4696319bb94b191eb0c9417a
MD5 hash:
c90cfc40ca06bf087ad22d7fb7fab278
SHA1 hash:
a3d7ce8dfd2b9e98ee7150b8a1c819173e0ace33
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekshen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe eeafeaa06f77c3fcedafcf46dcb18a8c0b931dcb4696319bb94b191eb0c9417a

(this sample)

  
Delivery method
Distributed via web download

Comments