MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 41d2f9ef245a688081894e9983a5094d9beb6d84bda7d057ecc15a247aea6a06. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 41d2f9ef245a688081894e9983a5094d9beb6d84bda7d057ecc15a247aea6a06
SHA3-384 hash: cdf1c81052160b83864ab0146c668a3ad8efa8d30ec69040bfd2720dd9370a1b8149d339eb613c5f65a2deeba73dced4
SHA1 hash: c53e527afdaf254b01cbd777a9fdcbb662b2be85
MD5 hash: e0632c73f8a2b0687f357fa424e9dbb1
humanhash: beer-rugby-alpha-pip
File name:e0632c73f8a2b0687f357fa424e9dbb1.exe
Download: download sample
Signature RedLineStealer
File size:588'288 bytes
First seen:2020-06-28 07:20:09 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 48a1546617037550627340747d2c151e (4 x RedLineStealer)
ssdeep 12288:/SLX54sz4aBGJKFOrzgSfckbQGLDLnRrZ13AQn4EjIh8G:/2534aBGJKFbiz8GLdZ1QQn4/8G
Threatray 38 similar samples on MalwareBazaar
TLSH A2C412227285D035D1E32171D422EA621775B8B1577191CB3B97272FAF702A0AF73B36
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer payload URL:
http://greenpalace.top/brazi/testoviyjuki.exe

RedLineStealer C2:
http://195.161.114.33/IRemotePanel

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request to an infection source
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-06-28 00:38:24 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
evasion spyware trojan
Behaviour
Checks processor information in registry
Legitimate hosting services abused for malware hosting/C2
Modifies system certificate store
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments