MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8520f698eb8be5c71b8fb52e23a2d58f722f37c60ff3a0244bd49024b7f9e18e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | 8520f698eb8be5c71b8fb52e23a2d58f722f37c60ff3a0244bd49024b7f9e18e |
|---|---|
| SHA3-384 hash: | e2b1c622e7d084990134d2dce7737065a05c73ed8b273c461a2d5d7f32f0674da467ccaa2bfd8b7ea25ff87702b0f8a6 |
| SHA1 hash: | 30f1cb333a8ac072fa4459d61926568e7a3b6dc0 |
| MD5 hash: | f980771fec7609750605351342656f42 |
| humanhash: | michigan-steak-steak-artist |
| File name: | 29E7CDB8F1750E73F15F4351BEC6F3612FF9FF583573B735D19A7F800A18F041.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 382'976 bytes |
| First seen: | 2024-07-24 12:30:41 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0aa6e337c2cfd6bc7063b3211897b34e (8 x RedLineStealer, 2 x Stop, 1 x Smoke Loader) |
| ssdeep | 6144:fdVmbh+8fhZY1kfIE1amnrheob7i52UClaxdZM7Ci8oH:fdUh+8fhZY1ZYJd9b+9ClaxdZhi |
| TLSH | T11584D010BB90C031E1B712F449BAD3ACB93E7EB15B65A5CB62D456EE16356E0EC3031B |
| TrID | 29.5% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 21.3% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9) 16.0% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 8.4% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 6.7% (.SCR) Windows screen saver (13097/50/3) |
| File icon (PE): | |
| dhash icon | 9edc8eeeaa8eccce (2 x RedLineStealer) |
| Reporter | Anonymous |
| Tags: | exe RedLineStealer |
Anonymous
this malware sample is very nasty!Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Check_OutputDebugStringA_iat |
|---|
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | maldoc_getEIP_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | meth_get_eip |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | shellcode |
|---|---|
| Author: | nex |
| Description: | Matched shellcode byte patterns |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
| CHECK_PIE | Missing Position-Independent Executable (PIE) Protection | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::SetProcessShutdownParameters KERNEL32.dll::CloseHandle |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::TerminateProcess KERNEL32.dll::FindNextVolumeW KERNEL32.dll::FindNextVolumeMountPointA KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryW KERNEL32.dll::GetDriveTypeW |
| WIN_BASE_EXEC_API | Can Execute other programs | KERNEL32.dll::AllocConsole KERNEL32.dll::FillConsoleOutputCharacterA KERNEL32.dll::FillConsoleOutputCharacterW KERNEL32.dll::FlushConsoleInputBuffer KERNEL32.dll::WriteConsoleInputW KERNEL32.dll::WriteConsoleW KERNEL32.dll::WriteConsoleOutputCharacterW KERNEL32.dll::WriteConsoleA |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileExW KERNEL32.dll::CopyFileA KERNEL32.dll::CreateFileA KERNEL32.dll::DeleteFileA KERNEL32.dll::MoveFileWithProgressA KERNEL32.dll::MoveFileA |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.