MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fbd8943e86d5ca2136d26242562087f502773e15329db918e93ec1449698a764. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 13


Intelligence 13 IOCs YARA 4 File information Comments 1

SHA256 hash: fbd8943e86d5ca2136d26242562087f502773e15329db918e93ec1449698a764
SHA3-384 hash: 282cf85a240f2f5fe190b4e1826e8279206211aba112fc67adfd93be12d25c0877fca253e366a0833e0f650cdbb34f66
SHA1 hash: afeca53c9b26837714d20b3dbab59bd02a8a4ea0
MD5 hash: e2b006c99a0462311a6d9b8577f822bd
humanhash: delaware-saturn-friend-november
File name:e2b006c99a0462311a6d9b8577f822bd
Download: download sample
Signature RedLineStealer
File size:1'600'000 bytes
First seen:2021-12-08 18:22:00 UTC
Last seen:2021-12-08 19:35:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d7dd6fa75115d9909f747434e40fff68 (173 x RedLineStealer, 10 x DCRat, 1 x CoinMiner.XMRig)
ssdeep 24576:0yEG7Sa7r5EGFht1qsq79w9TS3Y+/CNP48W7KqFgXAJMLkEaHNYK3ox4jft6c:0y37D79N0B+E7KqWXAOLNaSWjftJ
TLSH T16D7533536A48C02EE39622F12ABD3955E15788E6B4DDD483FB3B00C6442E5C3EEDD768
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
170
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e2b006c99a0462311a6d9b8577f822bd
Verdict:
Malicious activity
Analysis date:
2021-12-08 19:09:14 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
DNS request
Using the Windows Management Instrumentation requests
Creating a window
Reading critical registry keys
Running batch commands
Launching a process
Sending a TCP request to an infection source
Stealing user critical data
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Phoenix Miner RedLine
Detection:
malicious
Classification:
troj.spyw.evad.mine
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Performs DNS queries to domains with low reputation
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected Phoenix Miner
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 536605 Sample: sTJ2dRdPj1 Startdate: 08/12/2021 Architecture: WINDOWS Score: 100 125 Antivirus detection for dropped file 2->125 127 Multi AV Scanner detection for dropped file 2->127 129 Multi AV Scanner detection for submitted file 2->129 131 8 other signatures 2->131 8 sTJ2dRdPj1.exe 15 8 2->8         started        13 RegHost.exe 13 2->13         started        15 RegHost.exe 2->15         started        process3 dnsIp4 103 185.223.92.157, 44160, 49729 DDOS-GUARDRU Netherlands 8->103 105 162.159.129.233, 443, 49750 CLOUDFLARENETUS United States 8->105 107 cdn.discordapp.com 162.159.135.233, 443, 49743 CLOUDFLARENETUS United States 8->107 89 C:\Users\user\AppData\Local\Temp\3.exe, PE32 8->89 dropped 91 C:\Users\user\AppData\Local\Temp\2.exe, PE32+ 8->91 dropped 93 C:\Users\user\AppData\...\sTJ2dRdPj1.exe.log, ASCII 8->93 dropped 145 Detected unpacking (changes PE section rights) 8->145 147 Detected unpacking (overwrites its own PE header) 8->147 149 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 8->149 159 3 other signatures 8->159 17 2.exe 1 22 8->17         started        22 3.exe 13 8->22         started        109 185.199.109.133, 443, 49776, 49779 FASTLYUS Netherlands 13->109 111 raw.githubusercontent.com 13->111 113 github.com 13->113 151 Multi AV Scanner detection for dropped file 13->151 153 Query firmware table information (likely to detect VMs) 13->153 155 Machine Learning detection for dropped file 13->155 24 cmd.exe 13->24         started        26 cmd.exe 13->26         started        28 conhost.exe 13->28         started        115 2 other IPs or domains 15->115 157 Tries to detect sandboxes / dynamic malware analysis system (registry check) 15->157 30 cmd.exe 15->30         started        32 cmd.exe 15->32         started        34 conhost.exe 15->34         started        36 WerFault.exe 15->36         started        file5 signatures6 process7 dnsIp8 95 github.com 140.82.121.4, 443, 49754, 49756 GITHUBUS United States 17->95 97 raw.githubusercontent.com 185.199.108.133, 443, 49757, 49760 FASTLYUS Netherlands 17->97 81 C:\Users\user\AppData\Roaming\...\RegHost.exe, PE32+ 17->81 dropped 83 C:\Users\user\AppData\Roaming\...\7z.exe, PE32+ 17->83 dropped 85 C:\Users\user\AppData\Roaming\...\7z.dll, PE32+ 17->85 dropped 87 2 other files (none is malicious) 17->87 dropped 133 Multi AV Scanner detection for dropped file 17->133 135 Query firmware table information (likely to detect VMs) 17->135 137 Machine Learning detection for dropped file 17->137 141 7 other signatures 17->141 38 explorer.exe 17->38         started        40 bfsvc.exe 17->40         started        43 cmd.exe 17->43         started        47 3 other processes 17->47 99 192.168.2.1 unknown unknown 22->99 101 ccf9ba3695b15b4f0787e6290e0f63allcomejroo839jxi13.xyz 22->101 139 Performs DNS queries to domains with low reputation 22->139 45 conhost.exe 22->45         started        49 2 other processes 24->49 52 2 other processes 26->52 54 2 other processes 30->54 56 2 other processes 32->56 file9 signatures10 process11 file12 58 RegHost.exe 38->58         started        143 Hides threads from debuggers 40->143 62 conhost.exe 40->62         started        64 7z.exe 43->64         started        67 conhost.exe 43->67         started        69 curl.exe 1 47->69         started        71 conhost.exe 47->71         started        73 conhost.exe 47->73         started        75 7z.exe 47->75         started        79 C:\Users\user\AppData\...\RegHost_Temp.exe, PE32+ 49->79 dropped signatures13 process14 dnsIp15 117 140.82.121.3, 443, 49822, 49823 GITHUBUS United States 58->117 119 185.199.111.133, 443, 49824, 49828 FASTLYUS Netherlands 58->119 123 2 other IPs or domains 58->123 161 Query firmware table information (likely to detect VMs) 58->161 163 Tries to detect sandboxes / dynamic malware analysis system (registry check) 58->163 77 C:\Users\user\AppData\...\RegData_Temp.exe, PE32+ 64->77 dropped 121 api.telegram.org 149.154.167.220, 443, 49751 TELEGRAMRU United Kingdom 69->121 file16 signatures17
Threat name:
Win32.Packed.Generic
Status:
Suspicious
First seen:
2021-12-08 11:12:14 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
22 of 28 (78.57%)
Threat level:
  1/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery evasion infostealer persistence spyware stealer suricata trojan
Behaviour
Modifies system certificate store
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Loads dropped DLL
Reads user/profile data of web browsers
Downloads MZ/PE file
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Modifies Windows Defender Real-time Protection settings
RedLine
RedLine Payload
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
Unpacked files
SH256 hash:
6851e02d3f4b8179b975f00bbc86602a2f2f84524f548876eb656db7ea5eaa9c
MD5 hash:
c5124caf4aea3a83b63a9108fe0dcef8
SHA1 hash:
a43a5a59038fca5a63fa526277f241f855177ce6
SH256 hash:
fbd8943e86d5ca2136d26242562087f502773e15329db918e93ec1449698a764
MD5 hash:
e2b006c99a0462311a6d9b8577f822bd
SHA1 hash:
afeca53c9b26837714d20b3dbab59bd02a8a4ea0
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe fbd8943e86d5ca2136d26242562087f502773e15329db918e93ec1449698a764

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-12-08 18:22:02 UTC

url : hxxp://file-coin-data-5.com/files/5458_1638912711_5448.exe