MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 460d5aa48b9a922f9b8789e0b3373d861b54ec304a900468e2af3721d3d549eb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 10
| SHA256 hash: | 460d5aa48b9a922f9b8789e0b3373d861b54ec304a900468e2af3721d3d549eb |
|---|---|
| SHA3-384 hash: | 42c453a6d9d91ef94f43be6e5fc14fee3ddddc094537f1185bd3b68483cd2096bc0dfed8cd833fbe138a73b49998f7b4 |
| SHA1 hash: | a367d0666319f331077c61de311a592d6a73920c |
| MD5 hash: | 425b060de48dd60bb23dcd38b8be95f4 |
| humanhash: | bluebird-florida-charlie-zulu |
| File name: | Fornitee Hack.bin |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'447'296 bytes |
| First seen: | 2022-07-14 08:12:16 UTC |
| Last seen: | 2022-07-14 09:38:45 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 2bd4b8620ae035f6bf279b34fa17fcf7 (23 x RedLineStealer, 2 x Formbook, 1 x RecordBreaker) |
| ssdeep | 24576:mOX/w5cXnae6Pl0Y3YWgesFL1M0fdlb1Z6la+zgIr76XsI5L3:9XYcae6uhR+zgIr76XsI57 |
| TLSH | T111657D29EB0615B4DA23577185DEEB7B9B147A248036AF3FFF4BEB08A4330163C85156 |
| TrID | 36.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 23.5% (.EXE) Win64 Executable (generic) (10523/12/4) 11.2% (.EXE) Win16 NE executable (generic) (5038/12/1) 10.0% (.EXE) Win32 Executable (generic) (4505/5/1) 4.5% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 185.106.92.139:16578 | https://threatfox.abuse.ch/ioc/836953/ |
Intelligence
File Origin
# of uploads :
3
# of downloads :
259
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Fornitee Hack.exe
Verdict:
Malicious activity
Analysis date:
2022-07-13 21:16:07 UTC
Tags:
trojan rat redline loader
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Clean
Maliciousness:
Behaviour
Searching for the window
Sending a custom TCP request
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
anti-debug
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Redlinestealer
Status:
Malicious
First seen:
2022-07-14 08:13:12 UTC
File Type:
PE (Exe)
AV detection:
21 of 26 (80.77%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
redline
Score:
10/10
Tags:
family:redline botnet:donottouchmysquad infostealer spyware suricata
Behaviour
Modifies registry class
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
RedLine
RedLine payload
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
Malware Config
C2 Extraction:
185.106.92.139:16578
Unpacked files
SH256 hash:
5cf63e8035737740d4cfd06739209ecc7916e2c4bc00cca290a630c696eaa445
MD5 hash:
ea48773d808a48291795c7ed139bb7f8
SHA1 hash:
d19d34294ccedbcab49d6c5c020e62e36be5c481
SH256 hash:
460d5aa48b9a922f9b8789e0b3373d861b54ec304a900468e2af3721d3d549eb
MD5 hash:
425b060de48dd60bb23dcd38b8be95f4
SHA1 hash:
a367d0666319f331077c61de311a592d6a73920c
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.