MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 619ed29c59b4f6a8ad37d7ae185713c12899726ed88fcc03524430669f4a3c6c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 619ed29c59b4f6a8ad37d7ae185713c12899726ed88fcc03524430669f4a3c6c
SHA3-384 hash: 9008f1746114d925df93a69223f515e0539a75bf5b54df7efea4abae5427a0969d0c6eb8ea4e478ec160c62b1d533e31
SHA1 hash: 0f1b83fdef287f435c559797c98555d6369a846d
MD5 hash: 4d58c832c0e9ec29b6453c4d8f86a2d0
humanhash: alanine-low-double-sierra
File name:4d58c832c0e9ec29b6453c4d8f86a2d0.exe
Download: download sample
Signature RedLineStealer
File size:588'288 bytes
First seen:2020-06-28 06:35:01 UTC
Last seen:2020-06-28 07:43:05 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 6756dd0f87bcf115174789822e1f49a5 (1 x RedLineStealer)
ssdeep 12288:n9fkHukJtbcSMWJAEc0lui540Fi5D19CHJuUY/B6u1ijsQ87S1u:n9aPJ5cbalj6/CoUewu1iADSk
Threatray 210 similar samples on MalwareBazaar
TLSH 23C412237571F03BC4F72131AB71D5E13A2E3831252915972B542B2E9DB0AE0EE7939E
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer payload URL:
http://greenpalace.top/brazi/testoviyjuki.exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
94
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request to an infection source
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-06-28 06:36:06 UTC
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
evasion spyware trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments