MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fd261725d912617f603ae58cc680aa4085fd0621726b53612b52bed144455581. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 16


Intelligence 16 IOCs YARA 3 File information Comments

SHA256 hash: fd261725d912617f603ae58cc680aa4085fd0621726b53612b52bed144455581
SHA3-384 hash: 06c3114851adcc6f3434910b109f4358a1f5b7525a5a462b16ffd9f986ca2e16a0f66a07bfd6dd0765a4f366f64aacea
SHA1 hash: 274aca28907e6447738e94cd10f526ce91667da4
MD5 hash: 6472d96f842c33b50dc972072f424f2c
humanhash: eighteen-november-lactose-seventeen
File name:file
Download: download sample
Signature RedLineStealer
File size:345'600 bytes
First seen:2023-05-15 19:19:52 UTC
Last seen:2023-05-15 19:28:58 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e9c458cdd2bf4d052566046ce5f2e6b7 (3 x RedLineStealer, 1 x TeamBot, 1 x Tofsee)
ssdeep 3072:GNAApAFhUYZn9ORRJdVbLQ5K7+UdITF/Gov18JQCpcIShXgedjhuPyh69zJl+CON:VFXnnopVPQx51/8qhXdtuq0i9qEZzZ
Threatray 19 similar samples on MalwareBazaar
TLSH T17474E02232E09071F2635A354979C7B25A3BF8714F619ADF2BA5563F0FB02E1C976306
TrID 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
15.9% (.EXE) Win64 Executable (generic) (10523/12/4)
9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.6% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.8% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 116466626a6a6a62 (1 x RedLineStealer)
Reporter andretavare5
Tags:exe RedLineStealer


Avatar
andretavare5
Sample downloaded from http://109.206.243.208/1.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
281
Origin country :
US US
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
file
Verdict:
Malicious activity
Analysis date:
2023-05-15 19:22:35 UTC
Tags:
rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Using the Windows Management Instrumentation requests
Reading critical registry keys
Sending a custom TCP request
Creating a file
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Sending a TCP request to an infection source
Stealing user critical data
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Snort IDS alert for network traffic
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Lockbit
Status:
Malicious
First seen:
2023-05-15 19:20:07 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
18 of 37 (48.65%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline discovery infostealer spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Reads user/profile data of web browsers
RedLine
RedLine payload
Unpacked files
SH256 hash:
00477b9887ae01e0f04d8f338bfcbdcd7a535e07dae0f63f53a7602c29404697
MD5 hash:
1626aa1b977775332119e3ddcc29e45b
SHA1 hash:
b4c3681d94d1667ad6414c1b5664f9d57c2cbed1
SH256 hash:
1ed362bd7d4b682224053fa379fcac9d54180a5e041322b2c953997d89657ba6
MD5 hash:
98aa601d789d28959d6601ab55c05403
SHA1 hash:
b1a4e327e69dedf2ff818ff5feb6cf4e9e5e7245
Detections:
redline
Parent samples :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 hash:
ebe79cc234d61699a38624ddafd2cb2605b73bc2fca7daa9b8dec73a2205603b
MD5 hash:
c64f65436bebb9cfbac4cfa91af57641
SHA1 hash:
1df3ca0b3366a55d68a2c6595152cca977640766
Detections:
redline
Parent samples :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 hash:
fd261725d912617f603ae58cc680aa4085fd0621726b53612b52bed144455581
MD5 hash:
6472d96f842c33b50dc972072f424f2c
SHA1 hash:
274aca28907e6447738e94cd10f526ce91667da4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:MAL_Malware_Imphash_Mar23_1
Author:Arnim Rupp
Description:Detects malware by known bad imphash or rich_pe_header_hash
Reference:https://yaraify.abuse.ch/statistics/
Rule name:Windows_Trojan_Smokeloader_3687686f
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Dropped by
PrivateLoader
  
Delivery method
Distributed via drive-by

Comments