MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f0c76a9e0fde27921c2ad2b39d2d87f428a05e384d66fe01480a5be709d21432. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | f0c76a9e0fde27921c2ad2b39d2d87f428a05e384d66fe01480a5be709d21432 |
|---|---|
| SHA3-384 hash: | 271df9f606dc189d14d05de54e215a294ef7b6eb608d3b5f67811d3952c00721e4294541157689cdb6542478c4a66440 |
| SHA1 hash: | 20e72b06f3a38fa687b366a28898562680f5a021 |
| MD5 hash: | 07a6d215ab45552a3d941a74fb3eda37 |
| humanhash: | oregon-mountain-edward-alaska |
| File name: | 07a6d215ab45552a3d941a74fb3eda37.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'055'744 bytes |
| First seen: | 2023-05-23 11:50:28 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:Py0fl+v5MYJO6QzXLs8qeooLVt/mnlEPpz1CDUO:aQS5MYY6QzbssooLVNmnlov |
| Threatray | 4'396 similar samples on MalwareBazaar |
| TLSH | T1D4252323A7E8D4B5DCFA177028F716870B35FDB1A876939F21856D9B08B32809931763 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
267
Origin country :
NLVendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
07a6d215ab45552a3d941a74fb3eda37.exe
Verdict:
Malicious activity
Analysis date:
2023-05-23 11:53:04 UTC
Tags:
rat redline amadey trojan loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a file
Launching a service
Creating a window
Сreating synchronization primitives
Searching for synchronization primitives
Searching for the window
Launching a process
Launching cmd.exe command interpreter
Unauthorized injection to a recently created process
Stealing user critical data
Blocking the Windows Defender launch
Disabling the operating system update service
Unauthorized injection to a recently created process by context flags manipulation
Result
Malware family:
n/a
Score:
8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
10/10
Confidence:
100%
Tags:
advpack.dll anti-vm CAB greyware installer lolbin packed rundll32.exe setupapi.dll shell32.dll
Verdict:
Malicious
Labled as:
HEUR/AGEN.1307453
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Disable Windows Defender notifications (registry)
Disable Windows Defender real time protection (registry)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2023-05-23 11:51:05 UTC
File Type:
PE (Exe)
Extracted files:
118
AV detection:
19 of 23 (82.61%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 4'386 additional samples on MalwareBazaar
Result
Malware family:
redline
Score:
10/10
Tags:
family:redline botnet:diza discovery evasion infostealer persistence spyware stealer trojan
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Adds Run key to start application
Checks installed software on the system
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Windows security modification
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine payload
Malware Config
C2 Extraction:
83.97.73.122:19062
Unpacked files
SH256 hash:
242c9baa45c1efb5988ff4dfc188dbb1deeb745fcd801dda07f33e6fad6348db
MD5 hash:
72c1c0ed395d25dcac7948b7ca96c622
SHA1 hash:
2828432ce0a71e95c9de5f7156faf2577bc295e6
Detections:
redline
Parent samples :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 hash:
2cc94c247c7223109c0d4949a75c1119911ea16282e90340bc1b53c5eb859bc2
MD5 hash:
e4669f26748c85edc6218aca883f515a
SHA1 hash:
608d6ecadda7248347ab72836ac982bcba0e52df
SH256 hash:
a2f661c3d9f144af46d8d266071a974cacb445502574ef2a20beebc8528cb3f3
MD5 hash:
4d58b364dee7f7afd73b4635ff7969b8
SHA1 hash:
9afafe1222c7ac2674fa9d47b8a9215ede58e207
SH256 hash:
f0c76a9e0fde27921c2ad2b39d2d87f428a05e384d66fe01480a5be709d21432
MD5 hash:
07a6d215ab45552a3d941a74fb3eda37
SHA1 hash:
20e72b06f3a38fa687b366a28898562680f5a021
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.