MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 70b1258213ac2f4bf8d31993ac1fb61fe7aec5104c9f16986461fa73793b8c7f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 2 File information Comments

SHA256 hash: 70b1258213ac2f4bf8d31993ac1fb61fe7aec5104c9f16986461fa73793b8c7f
SHA3-384 hash: b470a831e313187a5b320f7cc48f51f4e3c2bfb7ad23718f90a471e1a7a36dd3417a22b5265c6471fb89ffdc3fbb15c8
SHA1 hash: 898eafd7fa13660a0f41f2aa8dd0084b61059e61
MD5 hash: 0c6ca1305bbce0bb9aace7687cace11b
humanhash: rugby-robin-september-eleven
File name:0c6ca1305bbce0bb9aace7687cace11b.exe
Download: download sample
Signature RedLineStealer
File size:411'648 bytes
First seen:2022-07-23 15:54:33 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 7bd7488899c0446f9369c1cbdc5054c4 (5 x RedLineStealer, 3 x Smoke Loader)
ssdeep 6144:3mRsM46OLYYEQ6r8DZU/5TMTBUf3yXRnMjDLR7G39kRUPmUUADxhduL4:2DdMYYEQ6ry+5Y+f3oa56y4FUY
Threatray 7'037 similar samples on MalwareBazaar
TLSH T1CE94CF00B790D435E0B716F849BA93A8B92D7EA0A73450CB62D53AEF47386E4DD3131B
TrID 40.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
17.0% (.SCR) Windows screen saver (13101/52/3)
13.6% (.EXE) Win64 Executable (generic) (10523/12/4)
8.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
6.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
File icon (PE):PE icon
dhash icon 2dac1378399b9b91 (35 x Smoke Loader, 34 x RedLineStealer, 18 x Amadey)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
433
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
CPUID_Instruction
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Generic Downloader
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Raccrypt
Status:
Malicious
First seen:
2022-07-22 16:39:01 UTC
File Type:
PE (Exe)
Extracted files:
15
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Gathering data
Unpacked files
SH256 hash:
2db63901f401bcfdda2a4c66d5854d56c17d604c96b4c2244acf8bc918d1d51b
MD5 hash:
5d6d87ae672e9f000e31cfe8da1b6f96
SHA1 hash:
8b66391d93ca715f217551b3eddf0acf717b163b
SH256 hash:
07428165052e171dcff87377dec2bce3f634917fb54c2609f4e9cf574858cf93
MD5 hash:
9b79ecdff2be08d18279e78aa4ce81d9
SHA1 hash:
4dee6cd4867c388ae43f5995b35c0e0326500753
SH256 hash:
902292b3a05fc21c8fdcca590ffbc6184566d41ce25d14c87d6adcfcf56083b5
MD5 hash:
5aedf200b2b820f5bd693ee3cabf767a
SHA1 hash:
15cb288b362d4941e31b4ffbd04787daf1d89647
SH256 hash:
70b1258213ac2f4bf8d31993ac1fb61fe7aec5104c9f16986461fa73793b8c7f
MD5 hash:
0c6ca1305bbce0bb9aace7687cace11b
SHA1 hash:
898eafd7fa13660a0f41f2aa8dd0084b61059e61
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe 70b1258213ac2f4bf8d31993ac1fb61fe7aec5104c9f16986461fa73793b8c7f

(this sample)

  
Delivery method
Distributed via web download

Comments