MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 a560f203c2e625c24ca5d86ab7b4fe90b6eebc96b6666eeab6231c6a55cca5db. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: a560f203c2e625c24ca5d86ab7b4fe90b6eebc96b6666eeab6231c6a55cca5db
SHA3-384 hash: becf70471297fa1bcb90efc90d5c013ba478b10912722dfce84864a1f6b5503db85fa06eef13f7b64f4a4db379e64988
SHA1 hash: 17a47ad1417f26dc564261c1a46c6f09fd1d9cb2
MD5 hash: cf32dcf004f18edc2d2e633821acb549
humanhash: winter-early-chicken-alpha
File name:SN212110200003 出口 C9 UPS提單1Z82342X0428805006(82342XCDX7K)_pdf .exe
Download: download sample
Signature RedLineStealer
File size:765'440 bytes
First seen:2022-10-24 06:41:59 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b6ef2d2e7423032e0ad980d94767f061 (2 x ModiLoader, 1 x RedLineStealer, 1 x BitRAT)
ssdeep 12288:QFwXm1eLcZbP9mpAmFXZ5e0mvXTeYZITtsUXIvxwUxLfHazzJr0:QFGQeabFmKmFzhmvJWurPB
Threatray 1'225 similar samples on MalwareBazaar
TLSH T14CF47CD36BA84432F52378369A1796BE78677C10356C9C472ACCF949CE37672E4281E3
TrID 26.5% (.EXE) Win32 Executable Delphi generic (14182/79/4)
24.5% (.SCR) Windows screen saver (13101/52/3)
19.7% (.EXE) Win64 Executable (generic) (10523/12/4)
8.4% (.EXE) Win32 Executable (generic) (4505/5/1)
5.6% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
File icon (PE):PE icon
dhash icon ecf48696cec4d4d4 (2 x ModiLoader, 1 x RedLineStealer, 1 x BitRAT)
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
185
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SN212110200003 出口 C9 UPS提單1Z82342X0428805006(82342XCDX7K)_pdf .exe
Verdict:
Suspicious activity
Analysis date:
2022-10-24 06:47:45 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Launching the default Windows debugger (dwwin.exe)
Searching for the window
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DBatLoader
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Yara detected DBatLoader
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2022-10-24 01:52:45 UTC
File Type:
PE (Exe)
Extracted files:
46
AV detection:
23 of 26 (88.46%)
Threat level:
  2/5
Result
Malware family:
modiloader
Score:
  10/10
Tags:
family:modiloader trojan
Behaviour
Suspicious use of WriteProcessMemory
Program crash
ModiLoader Second Stage
ModiLoader, DBatLoader
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments