MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fd50e5ce3b80417115401a4cc61ba7efd5c4d6f13d9166c26cc456b111d39fbb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 7


Intelligence 7 IOCs 1 YARA 4 File information Comments

SHA256 hash: fd50e5ce3b80417115401a4cc61ba7efd5c4d6f13d9166c26cc456b111d39fbb
SHA3-384 hash: 9b0ddb885ee6d1ef4e2cd7605807820e049de8fe961368ae6790c0ea374599ee561a329f7f97f69e560ef16e4c1572a8
SHA1 hash: 1f6a27de5c364bb6c78051616ca6dbb88a54437d
MD5 hash: 14a78c6ee6b35d46be2af9d7367528f3
humanhash: august-music-emma-oven
File name:Nitro Generate Crack.exe
Download: download sample
Signature RedLineStealer
File size:24'522'240 bytes
First seen:2021-10-28 16:43:48 UTC
Last seen:2021-10-28 18:15:34 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 2a2a662be9dffc461398e7c94d0b55b4 (5 x GuLoader, 3 x CoinMiner, 3 x RedLineStealer)
ssdeep 393216:FlhBVpcCBicOsLAO0h3Yg4TCk/WpWn37tRoZZEIuLC/VR1pFB1eZ2A8w/:FlfTxBiBsLAO0Wg4+0oZwW/tnBM8w
TLSH T12C3733316E3F56B8E18050B5FE81A1D7B280D72E40D22FE814B595FAB43C2E615FAF49
File icon (PE):PE icon
dhash icon cc966979dc69b2cc (1 x RedLineStealer)
Reporter Anonymous
Tags:exe RedLineStealer

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
80.89.237.147:39192 https://threatfox.abuse.ch/ioc/239331/

Intelligence


File Origin
# of uploads :
2
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %temp% directory
Running batch commands
Creating a window
Creating a process from a recently created file
Searching for the window
Creating a file
Result
Verdict:
MALICIOUS
Gathering data
Threat name:
Win32.Trojan.Babar
Status:
Malicious
First seen:
2021-10-27 04:43:02 UTC
AV detection:
23 of 44 (52.27%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:redline family:xmrig botnet:@onlypizdat evasion infostealer miner spyware
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks BIOS information in registry
Loads dropped DLL
Executes dropped EXE
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner Payload
RedLine
RedLine Payload
Suspicious use of NtCreateProcessExOtherParentProcess
xmrig
Malware Config
C2 Extraction:
80.89.237.147:39192
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_Stomped_PECompilation_Timestamp_InTheFuture
Author:ditekSHen
Description:Detect executables with stomped PE compilation timestamp that is greater than local current time
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments