MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f5a558eba4843612e1b2e7bbfb431932a94bdc86f9411c0529f4216bcfe0ef02. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA 2 File information Comments

SHA256 hash: f5a558eba4843612e1b2e7bbfb431932a94bdc86f9411c0529f4216bcfe0ef02
SHA3-384 hash: beabfc9093b1b32cb0f14c7439e24c273438c0f9b5f228e5d4ff3a5d6cd27a3bf5646c098b35b7118182e6221aebebb2
SHA1 hash: e0826e5b992b7aa566c557c71d6614804bd1430b
MD5 hash: bc8478f5caa7b719234c8e1cf8395b12
humanhash: uniform-nineteen-bluebird-golf
File name:BC8478F5CAA7B719234C8E1CF8395B12.exe
Download: download sample
Signature RedLineStealer
File size:11'182'368 bytes
First seen:2021-06-20 08:50:50 UTC
Last seen:2021-06-20 09:35:12 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 5a594319a0d69dbc452e748bcf05892e (21 x ParallaxRAT, 20 x Gh0stRAT, 15 x NetSupport)
ssdeep 196608:iQwBWytpde02bybOofBlFpTFv1jwFUTeaosQAvOb7zz1V+fjPcWWsTLZZb:iQwBNtve9ubdZ91jXeaonFzz16rSsX
Threatray 1 similar samples on MalwareBazaar
TLSH 07B6233BB268653ED5AE0B3245739320987BBB65781B8C2F47F0491DDF264702E3EA15
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
45.67.231.189:49441

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
45.67.231.189:49441 https://threatfox.abuse.ch/ioc/137572/

Intelligence


File Origin
# of uploads :
2
# of downloads :
223
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
BC8478F5CAA7B719234C8E1CF8395B12.exe
Verdict:
Suspicious activity
Analysis date:
2021-06-20 08:52:59 UTC
Tags:
installer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Creates processes via WMI
Detected unpacking (changes PE section rights)
Drops PE files with a suspicious file extension
Hides threads from debuggers
Machine Learning detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file has nameless sections
Sigma detected: Drops script at startup location
Submitted sample is a known malware sample
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 437305 Sample: k53f1UmAkl.exe Startdate: 20/06/2021 Architecture: WINDOWS Score: 100 125 Antivirus detection for dropped file 2->125 127 Multi AV Scanner detection for dropped file 2->127 129 Multi AV Scanner detection for submitted file 2->129 131 4 other signatures 2->131 14 k53f1UmAkl.exe 2 2->14         started        17 wscript.exe 2->17         started        20 uLpXHRtLdZ.exe.com 2->20         started        process3 dnsIp4 103 C:\Users\user\AppData\...\k53f1UmAkl.tmp, PE32 14->103 dropped 23 k53f1UmAkl.tmp 3 13 14->23         started        119 Creates processes via WMI 17->119 111 yHqQcNULPpdKATjsrrLBsaKdQaf.yHqQcNULPpdKATjsrrLBsaKdQaf 20->111 file5 signatures6 process7 file8 87 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 23->87 dropped 26 k53f1UmAkl.exe 2 23->26         started        process9 file10 89 C:\Users\user\AppData\...\k53f1UmAkl.tmp, PE32 26->89 dropped 29 k53f1UmAkl.tmp 5 19 26->29         started        process11 file12 95 C:\Program Files (x86)\...\is-LVN66.tmp, PE32+ 29->95 dropped 97 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 29->97 dropped 99 C:\Program Files (x86)\...\is-VN23N.tmp, PE32 29->99 dropped 101 C:\Program Files (x86)\...\is-85O5D.tmp, PE32 29->101 dropped 32 driv.exe 18 29->32         started        36 SRBPolaris.exe 2 29->36         started        process13 dnsIp14 105 bitbucket.org 104.192.141.1, 443, 49736 AMAZON-02US United States 32->105 107 s3-w.us-east-1.amazonaws.com 52.217.10.252, 443, 49737 AMAZON-02US United States 32->107 109 2 other IPs or domains 32->109 79 C:\Users\user\AppData\Local\Temp\ref.exe, PE32 32->79 dropped 81 C:\Users\user\AppData\Local\Temp\CCLI.exe, PE32 32->81 dropped 83 C:\Users\user\AppData\Local\...\CCLI[1].exe, PE32 32->83 dropped 85 C:\Users\user\AppData\Local\...\ref[1].exe, PE32 32->85 dropped 39 CCLI.exe 7 32->39         started        42 ref.exe 7 32->42         started        133 Hides threads from debuggers 36->133 file15 signatures16 process17 signatures18 135 Multi AV Scanner detection for dropped file 39->135 137 Machine Learning detection for dropped file 39->137 44 cmd.exe 1 39->44         started        47 cmd.exe 42->47         started        process19 signatures20 141 Submitted sample is a known malware sample 44->141 143 Obfuscated command line found 44->143 145 Uses ping.exe to sleep 44->145 147 Uses ping.exe to check the status of other devices and networks 44->147 49 cmd.exe 44->49         started        52 conhost.exe 44->52         started        54 cmd.exe 47->54         started        56 conhost.exe 47->56         started        process21 signatures22 121 Obfuscated command line found 49->121 123 Uses ping.exe to sleep 49->123 58 Velavi.exe.com 49->58         started        61 PING.EXE 49->61         started        64 findstr.exe 49->64         started        67 Rivederlo.exe.com 54->67         started        69 findstr.exe 54->69         started        71 PING.EXE 54->71         started        process23 dnsIp24 139 Drops PE files with a suspicious file extension 58->139 73 Velavi.exe.com 58->73         started        115 127.0.0.1 unknown unknown 61->115 117 192.168.2.1 unknown unknown 61->117 77 C:\Users\user\AppData\...\Velavi.exe.com, Targa 64->77 dropped file25 signatures26 process27 dnsIp28 113 yHqQcNULPpdKATjsrrLBsaKdQaf.yHqQcNULPpdKATjsrrLBsaKdQaf 73->113 91 C:\Users\user\AppData\...\uLpXHRtLdZ.exe.com, PE32 73->91 dropped 93 C:\Users\user\AppData\...\uLpXHRtLdZ.url, MS 73->93 dropped file29
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2021-06-17 01:55:00 UTC
AV detection:
14 of 29 (48.28%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:quasar family:redline botnet:office discovery infostealer spyware stealer trojan
Behaviour
Modifies system certificate store
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Drops file in Program Files directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Quasar Payload
Quasar RAT
RedLine
RedLine Payload
Malware Config
C2 Extraction:
5.61.62.193:5552
Unpacked files
SH256 hash:
1b97fc7a7128e89c8e1754130344d1341fbbede362d8801e347d759c76177cd7
MD5 hash:
59d61206b85c8e20096923107fb66e3d
SHA1 hash:
6e0fc8478e1a5b5a941268b3cd18848a89bdf6a3
SH256 hash:
e482c1ca1d7d25492bece594d16e3254e17d598d4b9b64e53017e1c68989983c
MD5 hash:
088e83c49279ddedc9aae03ed06c12d7
SHA1 hash:
e986df68a9b4f31aa72d89140a10a29a82dc5e03
SH256 hash:
1951697fb94793249a72989574b1a1abe5fdd73c634962b2e46ee5beedac3e60
MD5 hash:
89bd1cf750276d9fa54ef66fa9cecda6
SHA1 hash:
6844e17425947586d64948f39dc7c7dc6948ed36
SH256 hash:
f5a558eba4843612e1b2e7bbfb431932a94bdc86f9411c0529f4216bcfe0ef02
MD5 hash:
bc8478f5caa7b719234c8e1cf8395b12
SHA1 hash:
e0826e5b992b7aa566c557c71d6614804bd1430b
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:EnigmaStub
Author:@bartblaze
Description:Identifies Enigma packer stub.
Rule name:Sectigo_Code_Signed
Description:Detects code signed by the Sectigo RSA Code Signing CA
Reference:https://bazaar.abuse.ch/export/csv/cscb/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments