MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f643cf2250b1ece8e720df93180962e563c6c1e587f4e42af47e4c26ed4ab861. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: f643cf2250b1ece8e720df93180962e563c6c1e587f4e42af47e4c26ed4ab861
SHA3-384 hash: a4579b7e366e67ef0938ba19f547df96e3c1e9d7eabe7a58b03ea373c93c2cdebc0055dbed0f99d5be3e06323c088898
SHA1 hash: 9ba93dbf4b93a7abb3a417f87c0caec21d8b9463
MD5 hash: 109020f2c96e3a7cf9a25d1beb5ca27c
humanhash: rugby-butter-eighteen-north
File name:109020f2c96e3a7cf9a25d1beb5ca27c.exe
Download: download sample
Signature RedLineStealer
File size:2'399'759 bytes
First seen:2021-03-30 07:12:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e9c0657252137ac61c1eeeba4c021000 (53 x GuLoader, 26 x RedLineStealer, 17 x AgentTesla)
ssdeep 49152:2h+Ja1ecQlcYlL+35uALXmQJOm/XcMafV8bl+ycVwduVQDHIGJYd7nJWmbo8h:2h5eXlcj3lUlqblbJuKDQnn
Threatray 103 similar samples on MalwareBazaar
TLSH 70B5332135C6D809C601AE31993EEA2C9A620F9554D9BF203BB5B6373EBFC559C1A09C
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
109020f2c96e3a7cf9a25d1beb5ca27c.exe
Verdict:
Malicious activity
Analysis date:
2021-03-30 07:49:25 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Creating a file
Running batch commands
Creating a process with a hidden window
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to register a low level keyboard hook
Creates processes via WMI
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Check external IP via Powershell
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Svchost Process
Submitted sample is a known malware sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected AntiVM3
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 377974 Sample: USHrlfZEJC.exe Startdate: 30/03/2021 Architecture: WINDOWS Score: 100 94 api.ip.sb 2->94 104 Multi AV Scanner detection for submitted file 2->104 106 Yara detected AntiVM3 2->106 108 Sigma detected: Check external IP via Powershell 2->108 110 5 other signatures 2->110 14 USHrlfZEJC.exe 18 2->14         started        17 hglujlZhEL.exe.com 2->17         started        20 wscript.exe 2->20         started        signatures3 process4 dnsIp5 84 C:\Users\user\AppData\Local\Temp\up.exe, PE32 14->84 dropped 86 C:\Users\user\AppData\Local\Temp\e.exe, PE32 14->86 dropped 88 C:\Users\user\AppData\Local\...\SXPSL.dll, PE32 14->88 dropped 23 cmd.exe 1 1 14->23         started        92 oLByEUGeII.oLByEUGeII 17->92 26 hglujlZhEL.exe.com 17->26         started        112 Creates processes via WMI 20->112 file6 signatures7 process8 dnsIp9 114 Submitted sample is a known malware sample 23->114 116 Obfuscated command line found 23->116 118 Uses ping.exe to sleep 23->118 120 Uses ping.exe to check the status of other devices and networks 23->120 29 up.exe 7 23->29         started        32 e.exe 3 23->32         started        34 powershell.exe 15 18 23->34         started        37 conhost.exe 23->37         started        100 banusdoret.top 8.208.95.18, 443, 49720, 49726 CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdC Singapore 26->100 122 Tries to harvest and steal browser information (history, passwords, etc) 26->122 39 cmd.exe 26->39         started        41 cmd.exe 26->41         started        signatures10 process11 dnsIp12 128 Multi AV Scanner detection for dropped file 29->128 130 Machine Learning detection for dropped file 29->130 132 Contains functionality to register a low level keyboard hook 29->132 43 cmd.exe 1 29->43         started        45 svchost.exe 29->45         started        134 Injects a PE file into a foreign processes 32->134 47 e.exe 14 2 32->47         started        96 iplogger.org 88.99.66.31, 443, 49716 HETZNER-ASDE Germany 34->96 136 May check the online IP address of the machine 34->136 50 conhost.exe 39->50         started        52 WMIC.exe 39->52         started        54 conhost.exe 41->54         started        signatures13 process14 dnsIp15 56 cmd.exe 3 43->56         started        59 conhost.exe 43->59         started        102 195.54.160.9, 22829, 49722 SELECTELRU unknown 47->102 process16 signatures17 124 Obfuscated command line found 56->124 126 Uses ping.exe to sleep 56->126 61 Voi.exe.com 56->61         started        64 PING.EXE 1 56->64         started        67 findstr.exe 1 56->67         started        process18 dnsIp19 138 Drops PE files with a suspicious file extension 61->138 70 Voi.exe.com 6 61->70         started        90 127.0.0.1 unknown unknown 64->90 78 C:\Users\user\AppData\Roaming\...\Voi.exe.com, Targa 67->78 dropped file20 signatures21 process22 dnsIp23 98 oLByEUGeII.oLByEUGeII 70->98 80 C:\Users\user\AppData\...\hglujlZhEL.exe.com, PE32 70->80 dropped 82 C:\Users\user\AppData\...\hglujlZhEL.url, MS 70->82 dropped 74 Voi.exe.com 70->74         started        file24 process25 process26 76 WerFault.exe 74->76         started       
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2021-03-30 05:25:53 UTC
AV detection:
21 of 48 (43.75%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Unpacked files
SH256 hash:
d3c16112a56249d394c34134e71a6860fba98098f013a84557ba6159e18973d8
MD5 hash:
826f97c7a24ccc418601f78c35ea1f8b
SHA1 hash:
a23ac15198ead14b2040f248ce0335561f65d133
SH256 hash:
c8a70ca8a2f6f6d896269b60b9aa8f0bfa619550b443782ecad6db65e0d5b976
MD5 hash:
e2305ddb5097638677bd8f4ed8850842
SHA1 hash:
b80f2d38e0f22e1ff830c7e52dbedb3ce08bd728
SH256 hash:
fb313118d6b5ba471104483df934b84569370703c8248a341f7ada81197d8e82
MD5 hash:
6f8fd137c7206efaee358be2f1cd06d9
SHA1 hash:
3331fe706268dc19a896c4887d17920a40a3d42e
SH256 hash:
fdccaed76f7279e6b8cc1579dadeed03fa1b8d1adcdfbcac585a68da168366d5
MD5 hash:
8b603b23caf00139206f293eb741a9f0
SHA1 hash:
1cc90aec7ce07b13930fe0c088fe3cd155b3ea07
SH256 hash:
49b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
MD5 hash:
293165db1e46070410b4209519e67494
SHA1 hash:
777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SH256 hash:
ff1330297fe678fb8c5a22665d7a3f73ecf68c651d1701e750389d81301996c6
MD5 hash:
b45de4813084b8b974109767f954afea
SHA1 hash:
1032527d8975900424df676df58f4798d7157686
SH256 hash:
a6fe62d19b2b0f608fe3367ba5612742b9ff248b91a32b13fe189c891a22a00d
MD5 hash:
729168d16501390f6b7d92edb38886c4
SHA1 hash:
d244dc2a6325b22a02372c2b8e01ef4a3e51d10c
SH256 hash:
f643cf2250b1ece8e720df93180962e563c6c1e587f4e42af47e4c26ed4ab861
MD5 hash:
109020f2c96e3a7cf9a25d1beb5ca27c
SHA1 hash:
9ba93dbf4b93a7abb3a417f87c0caec21d8b9463
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe f643cf2250b1ece8e720df93180962e563c6c1e587f4e42af47e4c26ed4ab861

(this sample)

  
Delivery method
Distributed via web download

Comments