MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 faa3e926d4b9981b4b21a9c5a2cd61dd573b8eee6938a9519dbdfcabb32073c2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: faa3e926d4b9981b4b21a9c5a2cd61dd573b8eee6938a9519dbdfcabb32073c2
SHA3-384 hash: 158964125a474028312973cf389495cc5bfa48fb373c0e92a9e262faadc5a35c4c66e772eb4be19ce94bf3ec0c00a15f
SHA1 hash: 884254ea51e126da4e3a2bcad9e2c288e8ece8d7
MD5 hash: a1d235f9df5e4f7797abe0ccee91b6ac
humanhash: leopard-stream-orange-golf
File name:IObit Driver Booster Pro 9.exe
Download: download sample
Signature RedLineStealer
File size:1'186'304 bytes
First seen:2022-08-22 09:42:29 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1e33718404ffbe0d91b536c10bf053f8 (80 x RedLineStealer, 7 x RecordBreaker, 4 x N-W0rm)
ssdeep 24576:zpy3s93HOkRbN8HMYKYmZ/JZtSdMX9dKiopn8zCfS31H:zhHxX8bR5fSlH
Threatray 374 similar samples on MalwareBazaar
TLSH T133456C29E74B15B4DA635771859EEA779B047A348022AE3FFF4BDA0CB8330173C85256
TrID 44.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
23.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.4% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter tech_skeech
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
262
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
IObit Driver Booster Pro 9.exe
Verdict:
Malicious activity
Analysis date:
2022-08-22 09:44:00 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Snort IDS alert for network traffic
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Woreflint
Status:
Malicious
First seen:
2022-08-22 09:43:10 UTC
File Type:
PE (Exe)
AV detection:
21 of 25 (84.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline infostealer spyware
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Downloads MZ/PE file
RedLine
RedLine payload
Malware Config
C2 Extraction:
62.204.41.141:24758
Unpacked files
SH256 hash:
444d9397b42b550345ca90a3d0150c8e974595b6e25cb9cd1784632bd1a0bd6b
MD5 hash:
456b21e65801ff4a3a5e58f3f2c0fc69
SHA1 hash:
95ae365ceb121b9380f7aa9a2265e643b2988f9a
SH256 hash:
faa3e926d4b9981b4b21a9c5a2cd61dd573b8eee6938a9519dbdfcabb32073c2
MD5 hash:
a1d235f9df5e4f7797abe0ccee91b6ac
SHA1 hash:
884254ea51e126da4e3a2bcad9e2c288e8ece8d7
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe faa3e926d4b9981b4b21a9c5a2cd61dd573b8eee6938a9519dbdfcabb32073c2

(this sample)

  
Delivery method
Distributed via web download

Comments