MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7a03645778fdb4669f2b568982a722d19bf2a386bba16399d9a681242b2dbc4f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 7


Intelligence 7 IOCs YARA 7 File information Comments

SHA256 hash: 7a03645778fdb4669f2b568982a722d19bf2a386bba16399d9a681242b2dbc4f
SHA3-384 hash: 867500add1f28c38045e2285cb39a6d7fc05b9bdbd3d1b5442f13f71f6cf17ce23d9a0e38316c8bc10025e8f7a48006c
SHA1 hash: e08e6cee632ca017f0d46cab4397b23a44185c96
MD5 hash: cc53b90f2680000a6da047cd316951e5
humanhash: butter-rugby-paris-dakota
File name:OlympOfReptiles.exe
Download: download sample
Signature RedLineStealer
File size:18'006'528 bytes
First seen:2023-07-06 17:25:36 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e570a5ba1acc24c066e0421ddaeb64f5 (1 x RedLineStealer)
ssdeep 196608:ZAFJn6Pm1RQaR0o0uxT9Nozy9h33PxZynS4w4V/Jsv6tWKFdu9CkA1JV:ZxuRQaape5ZH4V/Jsv6tWKFdu9CBJ
TLSH T15A074B91A5C24062F674A0314C3E917FAA216B96477177EFB3886B8B5A30FE12D3734D
TrID 74.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
15.7% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
3.9% (.EXE) Win64 Executable (generic) (10523/12/4)
1.9% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.7% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon b870897a27148cb5 (2 x RedLineStealer)
Reporter iamdeadlyz
Tags:exe OlympOfReptiles RedLineStealer


Avatar
Iamdeadlyz
Fake Blockchain Games Deliver RedLine Stealer & Realst Stealer - A New macOS Infostealer Malware
https://iamdeadlyz.gitbook.io/malware-research/july-2023/fake-blockchain-games-deliver-redline-stealer-and-realst-stealer-a-new-macos-infostealer-malware

Intelligence


File Origin
# of uploads :
1
# of downloads :
279
Origin country :
SG SG
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
OlympOfReptiles.exe
Verdict:
No threats detected
Analysis date:
2023-07-06 17:27:02 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
control datper greyware keylogger lolbin packed remote replace
Result
Verdict:
MALICIOUS
Result
Threat name:
n/a
Detection:
clean
Classification:
n/a
Score:
2 / 100
Behaviour
Behavior Graph:
n/a
Verdict:
unknown
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Unpacked files
SH256 hash:
7a03645778fdb4669f2b568982a722d19bf2a386bba16399d9a681242b2dbc4f
MD5 hash:
cc53b90f2680000a6da047cd316951e5
SHA1 hash:
e08e6cee632ca017f0d46cab4397b23a44185c96
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:dsc
Author:Aaron DeVera
Description:Discord domains
Rule name:QbotStuff
Author:anonymous
Rule name:SUSP_Websites
Author:SECUINFRA Falcon Team
Description:Detects the reference of suspicious sites that might be used to download further malware
Rule name:without_attachments
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the no presence of any attachment
Reference:http://laboratorio.blogs.hispasec.com/
Rule name:with_urls
Author:Antonio Sanchez <asanchez@hispasec.com>
Description:Rule to detect the presence of an or several urls
Reference:http://laboratorio.blogs.hispasec.com/
Rule name:yara_template

File information


The table below shows additional information about this malware sample such as delivery method and external references.

00ac5235afdd1c22b8a28d2f5cbfbf9d5127680d8991cf21abc035222d0a0613

RedLineStealer

Executable exe 7a03645778fdb4669f2b568982a722d19bf2a386bba16399d9a681242b2dbc4f

(this sample)

7ba7f029b89f05033c24e08bc085d20d6fb42e7c8f11b07d028dbb133f64af12

  
Dropped by
SHA256 00ac5235afdd1c22b8a28d2f5cbfbf9d5127680d8991cf21abc035222d0a0613
  
Dropping
SHA256 7ba7f029b89f05033c24e08bc085d20d6fb42e7c8f11b07d028dbb133f64af12
  
Dropping
SHA256 6b9adb9e33519440e79d13f75d2ffa1a27cd9e419f75c069c0dd0d242b6184f4
  
Delivery method
Distributed via web download

Comments