MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fc45728dcdf75985369c218c0386d8b5e3e49fcbce67bf41c02ba31c01300b0a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | fc45728dcdf75985369c218c0386d8b5e3e49fcbce67bf41c02ba31c01300b0a |
|---|---|
| SHA3-384 hash: | 2ac42e2a70970cec9babd32db1acd9679fde73f6af3f0ac407de19407fe687cfb7e591c9e69209de2aef6be41e00fec7 |
| SHA1 hash: | 89f4751d04bd6c30eb41e9d9e5631e758aba6b6b |
| MD5 hash: | d2ee9fe7a5e32b70bb22438049025aa6 |
| humanhash: | nuts-violet-alpha-indigo |
| File name: | FC45728DCDF75985369C218C0386D8B5E3E49FCBCE67B.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 5'757'339 bytes |
| First seen: | 2022-08-08 06:05:20 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 98304:JOwO5QdckVNungkwwuSTEESxLy5NYTf7bWNqi3ZT+Gpx12LjXIEqlkpDGu:J0C9ukSTPS9YNgziIipyMx12LkEqlxu |
| TLSH | T18B4633BABC75FCF1EB5C56B20845467BA06DE9C8F77126703AD03504D3B91C8A53B0A9 |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://89.185.85.53/ | https://threatfox.abuse.ch/ioc/841794/ |
| 5.154.181.106:80 | https://threatfox.abuse.ch/ioc/841985/ |
Intelligence
File Origin
# of uploads :
1
# of downloads :
284
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
FC45728DCDF75985369C218C0386D8B5E3E49FCBCE67B.exe
Verdict:
No threats detected
Analysis date:
2022-08-08 06:07:53 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Сreating synchronization primitives
Creating a process from a recently created file
Creating a file
Searching for the window
Running batch commands
Sending a custom TCP request
DNS request
Searching for synchronization primitives
Launching a process
Launching the default Windows debugger (dwwin.exe)
Creating a process with a hidden window
Creating a window
Unauthorized injection to a recently created process
Result
Malware family:
n/a
Score:
5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
60%
Tags:
arkeistealer barys nymeria overlay packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Nymaim, RedLine, Socelars, onlyLogger
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Antivirus detection for URL or domain
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Connects to a pastebin service (likely for C&C)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (via service or powershell)
Found C&C like URL pattern
Found evasive API chain (trying to detect sleep duration tampering with parallel thread)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
PE file contains section with special chars
PE file has a writeable .text section
PE file has nameless sections
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Yara detected Generic Downloader
Yara detected Nymaim
Yara detected onlyLogger
Yara detected RedLine Stealer
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
Yara Genericmalware
Behaviour
Behavior Graph:
Detection:
redline
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2021-10-27 06:35:28 UTC
File Type:
PE (Exe)
Extracted files:
218
AV detection:
22 of 26 (84.62%)
Threat level:
5/5
Detection(s):
Malicious file
Verdict:
malicious
Result
Malware family:
socelars
Score:
10/10
Tags:
family:onlylogger family:privateloader family:raccoon family:redline family:socelars botnet:839b5f035af17fe32dbee0ca113be5fc botnet:chris botnet:media25 botnet:pub2 aspackv2 evasion infostealer loader main spyware stealer trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Creates scheduled task(s)
Enumerates processes with tasklist
Kills process with taskkill
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Enumerates physical storage devices
Program crash
AutoIT Executable
Suspicious use of SetThreadContext
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Looks up geolocation information via web service
Checks computer location settings
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
ASPack v2.12-2.42
Downloads MZ/PE file
Executes dropped EXE
OnlyLogger payload
Modifies Windows Defender Real-time Protection settings
OnlyLogger
PrivateLoader
Process spawned unexpected child process
Raccoon
Raccoon Stealer payload
RedLine
RedLine payload
Socelars
Socelars payload
Malware Config
C2 Extraction:
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
91.121.67.60:23325
194.104.136.5:46013
185.215.113.46:80
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
http://89.185.85.53/
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
91.121.67.60:23325
194.104.136.5:46013
185.215.113.46:80
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
http://89.185.85.53/
Unpacked files
SH256 hash:
ffb0fcede542fa2a31553073105b74f85e3a6d92987392dcce5e5e49743c878b
MD5 hash:
688bb186be4be7a4e668f4dff71ce220
SHA1 hash:
bc06b533f88e5260bdb9f63d19bac9fe71ee5c64
SH256 hash:
4887918b59cd66475a12a9c512ec570e6f900c23ef69ff7513e2b5cd63fd2ef2
MD5 hash:
4d3446a7e14d3250e1030b67e202c8dd
SHA1 hash:
cd8fdfdfed34fcd05700293658bfcf8528e68802
Detections:
win_smokeloader_a2
SH256 hash:
534941aa9745122d54bf41c53ad86c2e01a404d8075953c7b573cd20c1769244
MD5 hash:
de23f9266342b674f688c226caa704ce
SHA1 hash:
4fe39174632906914568b2b774e11d6ea456d393
SH256 hash:
92bc70b3e7e6c99bc93dec85ecd8db8b101a766917bee4967d36b20f5522ff57
MD5 hash:
b78915e5316a375923d57cd80d805845
SHA1 hash:
5ad907aa1adc5f7899a9304b4e814b381e4909de
SH256 hash:
41e3a2fc623255bf0242d98b5ec250e936bffbd2f5088699a450ef3079cb8107
MD5 hash:
2ed7bbac4969a0fe0466893cc12c7f51
SHA1 hash:
db8d430d28ab9a207fb9413b2a4ebb5ca182d4b2
SH256 hash:
eb8ffea34c1766bf42f4118fee7407047f71815ef92dec221121baf95338460d
MD5 hash:
138a0694a61a8f01bec3075df64aba30
SHA1 hash:
db4e3180dc492536e7d6a42f086c9b2b4c133e13
SH256 hash:
3c52bd10354f43581bf9a9a9a412110fd6675cfc3f0b95723e626119d801e81b
MD5 hash:
e6572d2bb4bd2e0910a9e35ef782f594
SHA1 hash:
da44b50ff1b7e2a7275d57dbae6b11cef418920f
SH256 hash:
2c964c5070502f6000bbb3f66f200a18ac7c394c5d6764c1d1f726783959d40a
MD5 hash:
5b68c333ae0c1d013619eda08f6665db
SHA1 hash:
d616077f94916d44662b6c6bf19b177e32454559
SH256 hash:
82b60a8c25db65bae520e73b7a67d2a6ca1f0fe6926439d0d7f1c0d52aa2f7d4
MD5 hash:
a758705ffd480485776c573bbe7091ca
SHA1 hash:
ae62bd009da6c2bf8e91f06a9a01890f74828d07
SH256 hash:
18383da9014c5143e91289c25e54bf8c286b480a0db25bd6e258386fa3704ee2
MD5 hash:
dc7af3760f24a022498c5872d40de945
SHA1 hash:
930899be0bea51091cb0a4d3b3d9e3a1d875b932
SH256 hash:
1599439bc3bad830c9eaa1045675a2064a41cf07a99465a0f1d149401371b8f1
MD5 hash:
b63f40f06cd7df80522acf4271ce78ea
SHA1 hash:
800a140ba9df9cdad361fe234ae7d96d4b389014
SH256 hash:
451fa609dbcdacee3f6b46a82a187636928ca42a38d1efa20f86f55ea3266f56
MD5 hash:
dd42414bab9b1f74e4c29ba2855ec4f8
SHA1 hash:
7daceb27584836d008f6a4617d82bb4539e3be85
Detections:
win_privateloader_a0
win_privateloader_w0
SH256 hash:
eb2beb14afe375a6b1fadafea434d8648a63e68a27b6b5923ecfdac40318e1cb
MD5 hash:
c8dc59b999863c9f4caf49718283fdfc
SHA1 hash:
6f3c65ba58243d8630ea107037ee043b29465a7c
SH256 hash:
4e35f60a5fd61e42653f13b8b1687aaac54de5a55ce26b89be3f4c7da2d6e3a5
MD5 hash:
f9697832b91a4f0f7ee007b463192f85
SHA1 hash:
5229d0696976279c0d8a46dee50c5602d34dbbb3
SH256 hash:
e1cc6a9d780602fe6e789bf5c3a27e87e197a4e3bf7c8138ea2f9dfec70fb963
MD5 hash:
f707252b9c9579677fffb013e0cfc646
SHA1 hash:
8ab483023fa8773afb8c13464c39c5b8e687f126
SH256 hash:
e297e89e11933aa6fc67cbd8da44fc0f6b8d8030166738b111b31673d41e4d19
MD5 hash:
2a2667d1fbcd8fde9ca0bd6f50827c79
SHA1 hash:
f6838f02651e1430613bf78de99e240dbcb8d3c7
SH256 hash:
0cddd277bd0f1f5510538c0bd9b1cff4c5cd01c5caee8eb9d06b9baa88519052
MD5 hash:
6449aa2e023c5931ac91815ca54225ed
SHA1 hash:
65b5f4df2c28472469ddf924e6b0d0a61394c612
SH256 hash:
142353c431e29ccce23e6a7e5a23ecbfc044e879331d33b51bc3413307a6f8f1
MD5 hash:
111a2f724d917c7d1707ad76bd927ea0
SHA1 hash:
3924cee72f2bdd170a286e6ba4bd4ae913137828
SH256 hash:
a55886b696bd3a865bb89d695accd3107b865460ce4f5d340d16e1c028bdc18d
MD5 hash:
d7e16ec1f086afd1368794129b50dc48
SHA1 hash:
73851a51f7a09186b644b76514728d1f6103c188
SH256 hash:
b3bbfa6bcba46e6215625935ff5ab834a8b57ac04483c223fc46ef469d191eb6
MD5 hash:
727dd55fb548b5031bffb3fbc79e593c
SHA1 hash:
14eb78ea9863076db08ed15223cbd6a02afbd357
SH256 hash:
b7a9ba1d58d3f258f942dbad1bfa4d6b34ec25a70b0d8181afd8f78961ca4757
MD5 hash:
853fb9dd8b491f238dfcdcb4e66190df
SHA1 hash:
1f6c0e3efe2dd24f5600140c58be5abc2bfb858d
SH256 hash:
116b58c9d589b59c56384ec9db883e00828779a6cbbf9b97772584ba1a37d3f9
MD5 hash:
2ba62cac6b2bde21552301dd23ecffee
SHA1 hash:
874d139b020c473a0a1530495575738409112207
SH256 hash:
7cda937e6eb0b1c1630c94328ab02170291b4e71d6dd7f6701eb3ffeb398ef0d
MD5 hash:
7167c1c6456bf24dfa3284cfc45a4c26
SHA1 hash:
eb24605ac5cedc497b73810dd97dd2a1290a6b1d
SH256 hash:
fc45728dcdf75985369c218c0386d8b5e3e49fcbce67bf41c02ba31c01300b0a
MD5 hash:
d2ee9fe7a5e32b70bb22438049025aa6
SHA1 hash:
89f4751d04bd6c30eb41e9d9e5631e758aba6b6b
Malware family:
RedNet
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.