MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f8d91f4cc808efd7847ecf949ca9d58874d0ade5d086089f3c36e2a32737d3ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: f8d91f4cc808efd7847ecf949ca9d58874d0ade5d086089f3c36e2a32737d3ce
SHA3-384 hash: 18366be09f9c75629795cb930c6cbf200529e14d08a625e8efd932c8b565916c7aeeb5dc041f162fdee115df069d12d7
SHA1 hash: ab9ae1212c685fe41064bed83e1d7ba91186942a
MD5 hash: c986663298d3883222625d68b6e40d8a
humanhash: mike-sixteen-crazy-fish
File name:c986663298d3883222625d68b6e40d8a.exe
Download: download sample
Signature RedLineStealer
File size:300'032 bytes
First seen:2021-09-17 18:59:28 UTC
Last seen:2021-09-17 20:20:03 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 410705447b2186b51cd6d6e90a878e3a (6 x RaccoonStealer, 3 x Tofsee, 1 x CoinMiner)
ssdeep 6144:8avULP82v9aBqmsVrjv9SgR0QcE2Yzz5JHJtF:8zg2vMbsqgnTltF
Threatray 2'601 similar samples on MalwareBazaar
TLSH T15954E01175E0C432C7961931A827C6A50A7EFEE1392D51AB7B683B3F7F316E06A61307
dhash icon 327a7c7d767e6e76 (4 x RedLineStealer, 1 x ArkeiStealer, 1 x DanaBot)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
217
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
c986663298d3883222625d68b6e40d8a.exe
Verdict:
Malicious activity
Analysis date:
2021-09-17 19:08:03 UTC
Tags:
installer trojan rat redline stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Launching a service
Creating a window
DNS request
Connection attempt
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Connection attempt to an infection source
Sending a TCP request to an infection source
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
88 / 100
Signature
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2021-09-17 19:00:45 UTC
AV detection:
23 of 28 (82.14%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:pub discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine Payload
Malware Config
C2 Extraction:
45.9.20.20:13441
Unpacked files
SH256 hash:
7de1f501c6f4edfbb3e61dda5d445b4482235420e19cd3e193ae3be26d374367
MD5 hash:
858ebd87027f4c3adcb5e2c59ec5161c
SHA1 hash:
f758ceef9690fb7430c910fcffd71c0cdb456834
SH256 hash:
541526a7b80a64b50c770517545d25c0515a146c3ddc5600a65d91cfdaf5e3a0
MD5 hash:
d964fece1f6eade1b3b0ab1ca479d7e1
SHA1 hash:
cf6948b22255272da7d81e38a936ee90b95c17ee
SH256 hash:
4e04bba712969aa15782d796bd66233e30de2ceb2fd6f23f8ec88b64b4857636
MD5 hash:
26e6a498e6fdb35574c6a6e51e0b7d1c
SHA1 hash:
394bd2b1362a1fe2fb96cc69971fa08c43bcbf14
SH256 hash:
f8d91f4cc808efd7847ecf949ca9d58874d0ade5d086089f3c36e2a32737d3ce
MD5 hash:
c986663298d3883222625d68b6e40d8a
SHA1 hash:
ab9ae1212c685fe41064bed83e1d7ba91186942a
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe f8d91f4cc808efd7847ecf949ca9d58874d0ade5d086089f3c36e2a32737d3ce

(this sample)

  
Delivery method
Distributed via web download

Comments