MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fba454b0f86b6514c9d9e5268ed58a398d30443819ec887fbc2b02d590dc1522. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs 1 YARA File information Comments

SHA256 hash: fba454b0f86b6514c9d9e5268ed58a398d30443819ec887fbc2b02d590dc1522
SHA3-384 hash: 3b61ab089609906c77e5823da73f246a2522a96f91141e2e054c4fbcfd182419dfc0ca2fa8632d79f84527ce7e50fb92
SHA1 hash: 9c99809aa69805f708afb5418b68b430d4087552
MD5 hash: 6e31d2f2c745b340e02b2e1f9711a715
humanhash: happy-eight-seventeen-eight
File name:fba454b0f86b6514c9d9e5268ed58a398d30443819ec887fbc2b02d590dc1522
Download: download sample
Signature RedLineStealer
File size:1'355'776 bytes
First seen:2022-05-16 08:08:53 UTC
Last seen:Never
File type:Microsoft Software Installer (MSI) msi
MIME type:application/x-msi
ssdeep 24576:utWcpVLS7ivFkvRtrhGYXpYYpTdA0eyZIxwawtkBo5WlT89gV/KFkyOL:MpdSuCxpYKg5YsYKbL
TLSH T1F55512503BC8C436D26E0A3698AB97617775BC220B22C2CBB794787C5E306D3ED79356
TrID 98.2% (.MSI) Microsoft Windows Installer (454500/1/170)
1.7% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter JAMESWT_WT
Tags:msi RedLineStealer

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
176.10.119.117:27038 https://threatfox.abuse.ch/ioc/571178/

Intelligence


File Origin
# of uploads :
1
# of downloads :
159
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
cmd.exe expand.exe fingerprint packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl
Score:
52 / 100
Signature
Document contains OLE streams with PE executables
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.RedLine
Status:
Suspicious
First seen:
2022-05-09 15:51:48 UTC
File Type:
Binary (Archive)
Extracted files:
40
AV detection:
14 of 41 (34.15%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:install discovery infostealer spyware
Behaviour
Checks SCSI registry key(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of WriteProcessMemory
Drops file in Windows directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Enumerates connected drives
Loads dropped DLL
Modifies file permissions
Executes dropped EXE
RedLine
RedLine Payload
Malware Config
C2 Extraction:
176.10.119.117:27038
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments