MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2fdb6f86925379ff52bbb5a5bb7ab5b53dc40d828d4a5f52c0189050b1dcb847. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments 1

SHA256 hash: 2fdb6f86925379ff52bbb5a5bb7ab5b53dc40d828d4a5f52c0189050b1dcb847
SHA3-384 hash: ce5f786e95c24c8af1b7644556acb26b466f3caa5f6d015c43d3f632bb24bb78cf06f89c85c4bea852fccf7ed2c06fa8
SHA1 hash: 7432dee3986c34bee9a4ee75f54adfb6437ce57b
MD5 hash: 84988f8e8d923673a26c009b55825bf6
humanhash: harry-east-romeo-mike
File name:84988f8e8d923673a26c009b55825bf6
Download: download sample
Signature RedLineStealer
File size:321'536 bytes
First seen:2021-09-20 16:40:32 UTC
Last seen:2021-09-20 17:56:07 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash d0a8c3f24685503ba25bd76f34c13b9e (8 x RedLineStealer, 3 x RaccoonStealer, 2 x DanaBot)
ssdeep 6144:Dk7VukLGyRV2IdqrJqOQS2kV8GwvLqzZ+RGrFVoFyYJaQl5c0LBXOsoSr:w5fRV2SqrVP2kGGwvWQcrF05Jf5nLBXP
Threatray 329 similar samples on MalwareBazaar
TLSH T16C64BF20B7E0C035F5B722F849B597B8A93D7EB06B2091CB62D526EA56353E4DC30787
File icon (PE):PE icon
dhash icon b3e8ecb6f6dcf9a6 (1 x RedLineStealer)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
84988f8e8d923673a26c009b55825bf6
Verdict:
Suspicious activity
Analysis date:
2021-09-20 16:42:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
RedLineDropperAHK
Result
Verdict:
Clean
Maliciousness:

Behaviour
DNS request
Connection attempt
Sending an HTTP GET request
Launching the default Windows debugger (dwwin.exe)
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
52 / 100
Signature
Country aware sample found (crashes after keyboard check)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Racealer
Status:
Malicious
First seen:
2021-09-20 16:41:12 UTC
AV detection:
17 of 45 (37.78%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Kills process with taskkill
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Deletes itself
Unpacked files
SH256 hash:
56bce56dd73e39bf34765ab7180df7f5603453dd849b42e711d23740e304cb75
MD5 hash:
217e82b4d3103941fb02b67d47618c89
SHA1 hash:
6b5a5b5f25eefaa6739b7cde771b09d5a8f62532
SH256 hash:
2fdb6f86925379ff52bbb5a5bb7ab5b53dc40d828d4a5f52c0189050b1dcb847
MD5 hash:
84988f8e8d923673a26c009b55825bf6
SHA1 hash:
7432dee3986c34bee9a4ee75f54adfb6437ce57b
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 2fdb6f86925379ff52bbb5a5bb7ab5b53dc40d828d4a5f52c0189050b1dcb847

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2021-09-20 16:40:34 UTC

url : hxxp://194.145.227.159/pub.php?pub=azed/