MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 059eb55a25da0be489dabbc4375dd365788c182234b8d73dc72e6845654bb2a2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: 059eb55a25da0be489dabbc4375dd365788c182234b8d73dc72e6845654bb2a2
SHA3-384 hash: bb997fcfdb78713965225a9bd2b4947bebaf9fa0e49fa651215b3a4c0cb12830e9d1fd5287510777a5c852cbd4273cff
SHA1 hash: 0ae787cfdb55c3407594f8099c50a0ac97cf0793
MD5 hash: e7dd8340cf790a04f6bf76d1d6b45c3a
humanhash: indigo-virginia-oscar-wyoming
File name:059eb55a25da0be489dabbc4375dd365788c182234b8d73dc72e6845654bb2a2
Download: download sample
Signature RedLineStealer
File size:1'249'336 bytes
First seen:2022-05-20 06:55:21 UTC
Last seen:2022-05-20 07:59:33 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash b9c3c1592f11f23844ce8b62fe6373ac (7 x RedLineStealer, 1 x Neurevt, 1 x ArkeiStealer)
ssdeep 24576:ZNawHTZmPPT78kBsTsvuwRt6O+abuu+/AtbaX+4vZMiwo+wpU:ZNaSiFBdYabu5xX+eao+wW
TLSH T11C4502029722B074F5A60CF1C8F48266292DF4B29B6094FFB3C196EC51B55D9AD31B3E
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon c8b0e8e4fcdcd37e (1 x RedLineStealer)
Reporter JAMESWT_WT
Tags:exe exxon-com RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
289
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
059eb55a25da0be489dabbc4375dd365788c182234b8d73dc72e6845654bb2a2
Verdict:
Suspicious activity
Analysis date:
2022-05-20 07:11:49 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a window
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
SystemUptime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zusy
Status:
Malicious
First seen:
2022-05-19 01:21:37 UTC
File Type:
PE (Exe)
Extracted files:
2
AV detection:
22 of 41 (53.66%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Unpacked files
SH256 hash:
a19daa31498b3ff7f8076dcfe29a09e9554fe51146c6fb45dac81840b3a85a52
MD5 hash:
423bcbecade3cd5ef26e92f2dc815797
SHA1 hash:
a54c5a7d265a1aa8657ed50cf68bfa61be0a3827
SH256 hash:
6503ec4f78e70dbc42168447fc9032b3ad7ae3b5a2cb67ad4c08a6f5018b29be
MD5 hash:
00a41bb2b7b92ea891378473d17717db
SHA1 hash:
e55e5bccf39613983a4e79b09a34f5b787dd8733
SH256 hash:
059eb55a25da0be489dabbc4375dd365788c182234b8d73dc72e6845654bb2a2
MD5 hash:
e7dd8340cf790a04f6bf76d1d6b45c3a
SHA1 hash:
0ae787cfdb55c3407594f8099c50a0ac97cf0793
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments