MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 110f27da9c8dc85e0c193a5d4bdade5019e4a1f9ffea49e9b3dc8eb069e2dbcc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 110f27da9c8dc85e0c193a5d4bdade5019e4a1f9ffea49e9b3dc8eb069e2dbcc
SHA3-384 hash: 74ee620dcfdd34e76c4389e5b24d3d6818bc896dd9de6f4a695ede51bf099897aa4a7df813f8a2528a5a5afce2cb8ede
SHA1 hash: 133c6fad900d31560e7c9cef4c3e165d5a0eef0d
MD5 hash: f0e78138a46c15ff670e082550ff90d5
humanhash: indigo-july-bacon-sodium
File name:f0e78138a46c15ff670e082550ff90d5.exe
Download: download sample
Signature RedLineStealer
File size:591'360 bytes
First seen:2020-06-28 07:20:49 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c8c1081c2ddb7701cfa5e0b911188831 (2 x RedLineStealer)
ssdeep 12288:8YFTaJo2jA+ixNsi+eEZEzehM5pKADlU+hirGq/8q+Rg9Qd8F:8CaJDM3xNueeJa5pKqS+h2GqH+r8F
Threatray 41 similar samples on MalwareBazaar
TLSH A5C412213694803AC7A729B284B586B19A3B7D335A34458737A4E73FEDB12F05F38716
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer payload URL:
http://greenpalace.top/brazi/testoviyjuki.exe

RedLineStealer C2:
http://195.161.114.33/IRemotePanel

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request to an infection source
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-06-28 00:37:20 UTC
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
evasion spyware trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments