MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 48e2a161b0fdf3dccf717a245fb44d119801714b4b23cc179753547a3277c02e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: 48e2a161b0fdf3dccf717a245fb44d119801714b4b23cc179753547a3277c02e
SHA3-384 hash: b49b6e7354190135758bdf4f23d96b4bbf53be8f7b13dd0d56b11fcbc808735ad1ab9c55d38b393ee6f4184d3ee72025
SHA1 hash: b61152012210b0499d47abfc54aa7fe12ba6382e
MD5 hash: e59eb7dccfd1619672051ebeb74a3a64
humanhash: arizona-grey-bacon-failed
File name:extract.exe
Download: download sample
Signature RedLineStealer
File size:167'936 bytes
First seen:2022-10-09 06:24:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cea7ae85c87ddc7295d39ff9cda31d1 (85 x RedLineStealer, 71 x LummaStealer, 61 x Rhadamanthys)
ssdeep 3072:cahKyd2n31d5GWp1icKAArDZz4N9GhbkrNEkO4CO:cahOpp0yN90QEe
Threatray 2'820 similar samples on MalwareBazaar
TLSH T13CF36B0663F41166F4B6677499F202935A32BCA29B75C2EF1284D57E1E33AC0E931F27
TrID 83.7% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
7.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
4.4% (.EXE) Win64 Executable (generic) (10523/12/4)
2.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.8% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter JAMESWT_WT
Tags:afterburner-msi exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
311
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://fermia.online/MSIAfterburner.msi
Verdict:
Malicious activity
Analysis date:
2022-10-09 06:23:14 UTC
Tags:
loader trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching a process
Creating a file
Launching cmd.exe command interpreter
Setting a single autorun event
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
advpack.dll rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 718989 Sample: extract.exe Startdate: 09/10/2022 Architecture: WINDOWS Score: 48 17 Multi AV Scanner detection for submitted file 2->17 7 extract.exe 1 3 2->7         started        9 rundll32.exe 2->9         started        process3 process4 11 cmd.exe 1 7->11         started        process5 13 conhost.exe 11->13         started        15 timeout.exe 1 11->15         started       
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Delays execution with timeout.exe
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Adds Run key to start application
Unpacked files
SH256 hash:
48e2a161b0fdf3dccf717a245fb44d119801714b4b23cc179753547a3277c02e
MD5 hash:
e59eb7dccfd1619672051ebeb74a3a64
SHA1 hash:
b61152012210b0499d47abfc54aa7fe12ba6382e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments