MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 41a037f09bf41b5cb1ca453289e6ca961d61cd96eeefb1b5bbf153612396d919. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 7
| SHA256 hash: | 41a037f09bf41b5cb1ca453289e6ca961d61cd96eeefb1b5bbf153612396d919 |
|---|---|
| SHA3-384 hash: | e94bc2804aeee28b75d65338d781bf7f08d45e0d8e2643b849e806283adb8fa32754ff1a68f09377dede0974263fafb2 |
| SHA1 hash: | fc32670a240a9e42ba6c453a68dec0933a85355f |
| MD5 hash: | a7eeab7e2e90d0373ebfb15243bff81a |
| humanhash: | autumn-enemy-carpet-august |
| File name: | 178.jar |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 14'612'480 bytes |
| First seen: | 2023-06-07 12:04:31 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/zip |
| ssdeep | 196608:pYBQXEPt5WaR6SynIRkIqZ81rI61CYYY+YA+X3vMMIYlRCu+EGlYxMrdhMTbnb:8rt5WaRRkZ81rtTidk/MMUlwmhMTLb |
| TLSH | T1D7E6F032FE96D02ED783D13608D2C997F838459CE24AE56B17E0069AC9B4D8D4B53BCD |
| TrID | 52.9% (.JAR) Java Archive (13500/1/2) 27.4% (.MAFF) Mozilla Archive Format (gen) (7000/1/1) 15.6% (.ZIP) ZIP compressed archive (4000/1) 3.9% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1) |
| Reporter | |
| Tags: | DynamicRAT jar java RAT RedLineStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
162
Origin country :
DEVendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
178.jar
Verdict:
Malicious activity
Analysis date:
2023-06-07 12:07:46 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
anti-debug lolbin obfuscated stealer
Result
Verdict:
MALICIOUS
Link:
Result
Threat name:
RedLine
Detection:
malicious
Classification:
spyw.expl.evad.troj
Score:
88 / 100
Signature
Exploit detected, runtime environment dropped PE file
Exploit detected, runtime environment starts unknown processes
Installs a global keyboard hook
Multi AV Scanner detection for submitted file
Sample is not signed and drops a device driver
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
ByteCode-JAVA.Trojan.Generic
Status:
Suspicious
First seen:
2023-06-02 10:49:23 UTC
File Type:
Binary (Archive)
Extracted files:
9042
AV detection:
6 of 37 (16.22%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Drops startup file
Loads dropped DLL
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.30
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.