MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 44ccaaf3cc76edd1e184d8c65b13db79638fcbf8ed37b5883c34a1a8a7700901. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 44ccaaf3cc76edd1e184d8c65b13db79638fcbf8ed37b5883c34a1a8a7700901
SHA3-384 hash: d055caa97c0077425a281ebc2e09306248a2f54a45b839f3da10f767f11928862a6eec533ef2d3daa1e24279877d956e
SHA1 hash: c4a4c52523972c16c8b4a0ed9014c4178522f4c2
MD5 hash: a0136bee34c8bf4a79a0fb75e4ffdf2e
humanhash: grey-monkey-east-thirteen
File name:a0136bee34c8bf4a79a0fb75e4ffdf2e.exe
Download: download sample
Signature RedLineStealer
File size:588'288 bytes
First seen:2020-06-28 06:36:53 UTC
Last seen:2020-06-28 07:43:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash e8429b333a3b877fef28ea361e57c026 (1 x RedLineStealer)
ssdeep 12288:wJUojuZEqGBzufIc+24WJV62iqql6p7WbPey8eJeFT2a3+6Jx+:wJDuZ3FAc+24WJV62iqqlqihJLjqx+
Threatray 38 similar samples on MalwareBazaar
TLSH CCC412173190F036C4936176D861E6B2473D7D2292A1959F6BD8373FAEF05A04F323AA
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer payload URL:
http://greenpalace.top/brazi/testoviyjuki.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
87
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request to an infection source
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-06-28 06:38:04 UTC
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
evasion spyware trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments