MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2af0e212ad70eaf8b96a645045ef2764700b5adf7b1187ae3d82240f96f613e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 2af0e212ad70eaf8b96a645045ef2764700b5adf7b1187ae3d82240f96f613e2
SHA3-384 hash: dccff4e18c501a499a2c88111abe469a66d02d14486b6a34b4177bdc45bc8c104868deef270d80c1cd179f3d7a61b95e
SHA1 hash: 091f960fe4317696fb30abc3b36d2c8a7eef4b65
MD5 hash: e415186a6a2209817e01f4ec932f3c9a
humanhash: uncle-autumn-rugby-angel
File name:realst
Download: download sample
File size:7'695'008 bytes
First seen:2023-07-06 15:11:08 UTC
Last seen:Never
File type:php macho
MIME type:application/x-mach-binary
ssdeep 98304:Wkl7JAfQ0RAQvv54nrvTssssss+f3Mj8L9QyS8Xceh/MfSPnaNhlWPSPSt:FlXPssssss+48RQyS8XhaNhlWBt
TLSH T1F1767D27B9A54A74D287C03049DF83A26B71F9364235FAEB1775E7391F22C128B4D34A
Reporter iamdeadlyz
Tags:machO macOS RealstStealer


Avatar
Iamdeadlyz
Fake Blockchain Games Deliver RedLine Stealer & Realst Stealer - A New macOS Infostealer Malware
https://iamdeadlyz.gitbook.io/malware-research/july-2023/fake-blockchain-games-deliver-redline-stealer-and-realst-stealer-a-new-macos-infostealer-malware

Intelligence


File Origin
# of uploads :
1
# of downloads :
142
Origin country :
SG SG
Vendor Threat Intelligence
Gathering data
Result
Verdict:
MALICIOUS
Threat name:
MacOS.Trojan.Generic
Status:
Suspicious
First seen:
2023-06-28 21:59:56 UTC
File Type:
MachO64 Little (Exe)
AV detection:
3 of 38 (7.89%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:Rustyloader_mem_loose
Author:James_inthe_box
Description:Corroded buerloader
Reference:https://app.any.run/tasks/83064edd-c7eb-4558-85e8-621db72b2a24

File information


The table below shows additional information about this malware sample such as delivery method and external references.

e9f1012ed31062dfb4e1f8e6df7b1c07e0bf3c3b75d2bce80c724c03c56d09b3

php macho 2af0e212ad70eaf8b96a645045ef2764700b5adf7b1187ae3d82240f96f613e2

(this sample)

  
Dropped by
SHA256 e9f1012ed31062dfb4e1f8e6df7b1c07e0bf3c3b75d2bce80c724c03c56d09b3
  
Delivery method
Distributed via web download

Comments