MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0fc6717ef7ff0ae8d2a2add4303127af4693cfa5abb81a5a3a3e06b079051b8e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 0fc6717ef7ff0ae8d2a2add4303127af4693cfa5abb81a5a3a3e06b079051b8e
SHA3-384 hash: ad5f4513d75e989f802b867c6c37509d9de18c85e6c8bd4eaa692f2cb2eec8ff80d1597d3cb4384aeb607c1416a5254b
SHA1 hash: 75749fbe377a562351a82cd24313e569c9f5c450
MD5 hash: 2cfc6177526dc8426a0258d1ff283e90
humanhash: connecticut-magnesium-vermont-hawaii
File name:2cfc6177526dc8426a0258d1ff283e90.exe
Download: download sample
Signature RedLineStealer
File size:586'240 bytes
First seen:2020-06-28 07:28:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c8c1081c2ddb7701cfa5e0b911188831 (2 x RedLineStealer)
ssdeep 12288:0YFThhlh8hOYV6XlCji1wG+KNhW8ZdDhLsVXiV4RwGV0U843H:0ChhlhAbmRmG+n8ZdDhgiV4RwGJ8C
Threatray 40 similar samples on MalwareBazaar
TLSH B2C412113240E135C8EB5575A486F2A12ABEE4714377C4577A643F3FAEB02B04F37A9A
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer payload URL:
http://greenpalace.top/brazi/testoviyjuki.exe

RedLineStealer C2:
http://195.161.114.33/IRemotePanel

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request to an infection source
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-06-28 00:45:00 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
evasion spyware trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments