MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f9a4620f23e2486480307c9a1ac92ee2783f2828bf8e8601e619b670c78673bb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 6 File information Comments

SHA256 hash: f9a4620f23e2486480307c9a1ac92ee2783f2828bf8e8601e619b670c78673bb
SHA3-384 hash: 084cdb8429afd6cd016985269fa348dd3ad171f70803e4e594874d413afec0997b406d0145ed6720854d20aad10b0d6e
SHA1 hash: 4d3bf2a823bb6fab015ba843c6993f164ee0991d
MD5 hash: 781585b215c56b49540936013f1468b4
humanhash: texas-floor-washington-pizza
File name:f9a4620f23e2486480307c9a1ac92ee2783f2828bf8e8.exe
Download: download sample
Signature RedLineStealer
File size:343'552 bytes
First seen:2023-08-12 06:41:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 57c957ecde7ffcaeaa065ed04df47092 (8 x RedLineStealer, 1 x TeamBot, 1 x Rhadamanthys)
ssdeep 6144:s0yyNL83k1gfQEsv4muuIeuwPAhyz9nHBeJZhB:s/06k1gfQhvMe4hypBeJ1
TLSH T14A74F1317AA2D072C94701B49524DBA4AABF743192B4865737690BFE5FF02C1CFA734A
TrID 37.3% (.EXE) Win64 Executable (generic) (10523/12/4)
17.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
16.0% (.EXE) Win32 Executable (generic) (4505/5/1)
7.3% (.ICL) Windows Icons Library (generic) (2059/9)
7.2% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 0204040410482000 (1 x RedLineStealer)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
51.83.170.21:19447

Intelligence


File Origin
# of uploads :
1
# of downloads :
278
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
ID:
1
File name:
f484ecae35ba9e1d8db31a1aac500377.exe
Verdict:
Malicious activity
Analysis date:
2023-08-12 06:34:12 UTC
Tags:
loader smoke trojan payload amadey fabookie stealer redline ransomware stop vidar arkei

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a window
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
CPUID_Instruction
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Gathering data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine, Xmrig
Detection:
malicious
Classification:
troj.adwa.spyw.evad.mine
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Creates an autostart registry key pointing to binary in C:\Windows
Creates files in the system32 config directory
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Schedule binary from dotnet directory
Sigma detected: Stop multiple services
Snort IDS alert for network traffic
Suspicious powershell command line found
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1290372 Sample: f9a4620f23e2486480307c9a1ac... Startdate: 12/08/2023 Architecture: WINDOWS Score: 100 113 Snort IDS alert for network traffic 2->113 115 Found malware configuration 2->115 117 Malicious sample detected (through community Yara rule) 2->117 119 16 other signatures 2->119 10 f9a4620f23e2486480307c9a1ac92ee2783f2828bf8e8.exe 15 4 2->10         started        15 updater.exe 2->15         started        17 cmd.exe 2->17         started        19 12 other processes 2->19 process3 dnsIp4 97 51.83.170.21, 19447, 49711 OVHFR France 10->97 99 transfer.sh 144.76.136.153, 443, 49716, 49717 HETZNER-ASDE Germany 10->99 81 C:\Users\user\AppData\Local\Temp\mi.exe, PE32 10->81 dropped 83 C:\Users\user\AppData\Local\Temp\cli.exe, PE32 10->83 dropped 85 C:\Users\user\AppData\Local\Temp\cc.exe, PE32 10->85 dropped 139 Detected unpacking (changes PE section rights) 10->139 141 Detected unpacking (overwrites its own PE header) 10->141 143 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 10->143 157 2 other signatures 10->157 21 cli.exe 10->21         started        24 mi.exe 5 10->24         started        27 cc.exe 14 74 10->27         started        87 C:\Windows\Temp\pdssyqafsuqw.tmp, PE32+ 15->87 dropped 89 C:\Program Filesbehaviorgraphoogle\Libs\WR64.sys, PE32+ 15->89 dropped 145 Query firmware table information (likely to detect VMs) 15->145 147 Injects code into the Windows Explorer (explorer.exe) 15->147 149 Writes to foreign memory regions 15->149 159 6 other signatures 15->159 151 Uses powercfg.exe to modify the power settings 17->151 153 Modifies power options to not sleep / hibernate 17->153 30 conhost.exe 17->30         started        32 sc.exe 17->32         started        38 4 other processes 17->38 155 Creates files in the system32 config directory 19->155 34 WerFault.exe 19->34         started        36 conhost.exe 19->36         started        40 14 other processes 19->40 file5 signatures6 process7 dnsIp8 121 Multi AV Scanner detection for dropped file 21->121 123 Machine Learning detection for dropped file 21->123 125 Writes to foreign memory regions 21->125 135 2 other signatures 21->135 42 AppLaunch.exe 2 26 21->42         started        47 WerFault.exe 21->47         started        77 C:\Windows\Temp\setup.exe, PE32+ 24->77 dropped 49 setup.exe 24->49         started        109 127.0.0.1 unknown unknown 27->109 79 C:\Users\user\AppData\...\DownloadMetadata, PDP-11 27->79 dropped 127 Query firmware table information (likely to detect VMs) 27->127 129 Tries to harvest and steal browser information (history, passwords, etc) 27->129 131 Hides threads from debuggers 27->131 133 Tries to detect sandboxes / dynamic malware analysis system (registry check) 27->133 51 chrome.exe 27->51         started        file9 signatures10 process11 dnsIp12 101 46.29.235.84, 49730, 80 EUROTELECOM-ASRU Russian Federation 42->101 103 ip-api.com 208.95.112.1, 49720, 80 TUT-ASUS United States 42->103 107 4 other IPs or domains 42->107 91 C:\ProgramData\...\MTA1.exe, PE32 42->91 dropped 161 Creates an autostart registry key pointing to binary in C:\Windows 42->161 163 Uses schtasks.exe or at.exe to add and modify task schedules 42->163 165 Adds a directory exclusion to Windows Defender 42->165 53 powershell.exe 42->53         started        56 schtasks.exe 42->56         started        58 powershell.exe 42->58         started        60 schtasks.exe 42->60         started        93 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 49->93 dropped 95 C:\Windows\System32\drivers\etc\hosts, ASCII 49->95 dropped 167 Multi AV Scanner detection for dropped file 49->167 169 Suspicious powershell command line found 49->169 171 Query firmware table information (likely to detect VMs) 49->171 173 3 other signatures 49->173 105 192.168.2.1 unknown unknown 51->105 62 chrome.exe 51->62         started        file13 signatures14 process15 dnsIp16 137 Adds a directory exclusion to Windows Defender 53->137 65 powershell.exe 53->65         started        67 conhost.exe 53->67         started        69 conhost.exe 56->69         started        71 conhost.exe 58->71         started        73 conhost.exe 60->73         started        111 www.google.com 142.251.36.164, 443, 49735, 49736 GOOGLEUS United States 62->111 signatures17 process18 process19 75 conhost.exe 65->75         started       
Threat name:
Win32.Trojan.Smokeloader
Status:
Malicious
First seen:
2023-08-12 06:42:06 UTC
File Type:
PE (Exe)
Extracted files:
7
AV detection:
17 of 24 (70.83%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:logsdiller cloud (tg: @logsdillabot) evasion infostealer spyware stealer themida
Behaviour
Creates scheduled task(s)
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Themida packer
Downloads MZ/PE file
Drops file in Drivers directory
Stops running service(s)
RedLine
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
51.83.170.21:19447
Unpacked files
SH256 hash:
b55e1c0a9ce36343c22e5ad7f30f675fe722048ab03e9b337f5fcfc26eae2030
MD5 hash:
8ca2ddeafd6d4d5500ecfc456de05fef
SHA1 hash:
dfc286cea0377ce4e87390a9b3a04125b443feb3
SH256 hash:
a09c5960bc71ec0bb704155841deae7a68c79ce5f06fae6b64c5edf910f2f588
MD5 hash:
4306dc87afa90266d8c8311e606f0f4d
SHA1 hash:
b719dd8795afdf5d4ba955473da8380878e08b4a
SH256 hash:
f9a4620f23e2486480307c9a1ac92ee2783f2828bf8e8601e619b670c78673bb
MD5 hash:
781585b215c56b49540936013f1468b4
SHA1 hash:
4d3bf2a823bb6fab015ba843c6993f164ee0991d
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_find_kernel32_base_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe f9a4620f23e2486480307c9a1ac92ee2783f2828bf8e8601e619b670c78673bb

(this sample)

  
Delivery method
Distributed via web download

Comments