MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 957818fe99ed9cbbbd5c7a1da5af7fe3db3f7623e19ab47c932076df855eb0c1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 12
| SHA256 hash: | 957818fe99ed9cbbbd5c7a1da5af7fe3db3f7623e19ab47c932076df855eb0c1 |
|---|---|
| SHA3-384 hash: | 96ac042d52da5ba72d50ccb86ddce4abae17de0ffceef2b47772e7ae48d95425d9513ba00c5f9ddf4dacc805f83dc4e9 |
| SHA1 hash: | 381b52b4ba0b24e201d90a63fc25f9343f6e24c8 |
| MD5 hash: | acdf15a17b8b11a95ba85bfd088f67ed |
| humanhash: | hamper-bacon-alanine-pizza |
| File name: | acdf15a17b8b11a95ba85bfd088f67ed.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 458'240 bytes |
| First seen: | 2021-10-13 09:31:44 UTC |
| Last seen: | 2021-10-13 11:24:20 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4b52e566ef5b8727d87906b4623fc7d4 (3 x RedLineStealer, 2 x Smoke Loader, 2 x ArkeiStealer) |
| ssdeep | 12288:A/SInaLQNf5mc4yDDwVR/6O3kLM77BRN:S9nc85AyDDMSO3f |
| Threatray | 75 similar samples on MalwareBazaar |
| TLSH | T186A4CF10A3A0C035F5F356F94DB99368A53EBAA16B2481CF62D51AEE5634AE1FC30347 |
| File icon (PE): | |
| dhash icon | aad8ac9cc6e68ee0 (12 x RedLineStealer, 6 x RaccoonStealer, 3 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
2
# of downloads :
184
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
acdf15a17b8b11a95ba85bfd088f67ed.exe
Verdict:
Suspicious activity
Analysis date:
2021-10-13 11:15:35 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
RedLine
Result
Verdict:
Clean
Maliciousness:
Behaviour
Creating a window
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Azorult
Status:
Malicious
First seen:
2021-10-13 09:36:04 UTC
AV detection:
24 of 28 (85.71%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 65 additional samples on MalwareBazaar
Result
Malware family:
redline
Score:
10/10
Tags:
family:redline infostealer
Behaviour
RedLine
RedLine Payload
Unpacked files
SH256 hash:
bbd75eecff43cb693c0f102e42ef3aa6a07a36221830b1afe589752a5d86a722
MD5 hash:
401f3ad661878437b2b7d0dec55a82b9
SHA1 hash:
f503559a318eedaad9e2d13877da2646bb269ecf
SH256 hash:
492a3e1fcc1f09a5a39a27807e80dbcf375e756fb4260b0c79b2bb6ee271424d
MD5 hash:
e0802b634546e5e426a8f36c9854e396
SHA1 hash:
d5304ec084ce46faf3a34c73674dc740282f7041
SH256 hash:
b3a6f2a1a318b49bb4aaa273975550a119d7e832890ae2d2eba5ee9c46e7aa5b
MD5 hash:
d117e1ca0f171bd9abf46c51c161f096
SHA1 hash:
34851a8b1997e17f2b6f666ba07b7c816065c827
SH256 hash:
957818fe99ed9cbbbd5c7a1da5af7fe3db3f7623e19ab47c932076df855eb0c1
MD5 hash:
acdf15a17b8b11a95ba85bfd088f67ed
SHA1 hash:
381b52b4ba0b24e201d90a63fc25f9343f6e24c8
Malware family:
RedNet
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.