MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 acb5fd38a1242912e31423cb90abddbd78cb39ed19efe4768b70af99092f1328. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments 1

SHA256 hash: acb5fd38a1242912e31423cb90abddbd78cb39ed19efe4768b70af99092f1328
SHA3-384 hash: 4b4a99ae7e89515ed1649e0b467f4e4cc760241fc49ee733576dd0252bd4a6175e2c9caf7c9e25b6a3c83be5352e724a
SHA1 hash: d06b863f439c03c20f3600222196cb2465696b21
MD5 hash: d2e78f6663b47a7ec04a4d014cab5ff1
humanhash: illinois-fillet-alaska-spaghetti
File name:d2e78f6663b47a7ec04a4d014cab5ff1
Download: download sample
Signature RedLineStealer
File size:834'560 bytes
First seen:2022-12-21 01:12:10 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cea7ae85c87ddc7295d39ff9cda31d1 (85 x RedLineStealer, 70 x LummaStealer, 61 x Rhadamanthys)
ssdeep 12288:6gy90wnQoGlU9coZ7u0pkk8oiezBswA3ptpsVjCk/TG:5y9pWU9j7u0+3Its73zpshCk/a
Threatray 261 similar samples on MalwareBazaar
TLSH T12B05122272E19192E5BA67709DF7028716317CD6AB35CBEF2391D11D0E237D46A32387
TrID 83.0% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
6.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
4.4% (.EXE) Win64 Executable (generic) (10523/12/4)
2.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.8% (.ICL) Windows Icons Library (generic) (2059/9)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter zbetcheckin
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
171
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d2e78f6663b47a7ec04a4d014cab5ff1
Verdict:
Malicious activity
Analysis date:
2022-12-21 01:13:20 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
Creating a window
Verdict:
No Threat
Threat level:
  2/10
Confidence:
75%
Tags:
advpack.dll certutil.exe packed rundll32.exe setupapi.dll shell32.dll
Result
Threat name:
Unknown
Detection:
malicious
Classification:
bank.evad
Score:
64 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Registers a new ROOT certificate
Uses certutil -decode
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 771068 Sample: VB9IXWSwU3.exe Startdate: 21/12/2022 Architecture: WINDOWS Score: 64 20 Antivirus / Scanner detection for submitted sample 2->20 22 Multi AV Scanner detection for submitted file 2->22 7 VB9IXWSwU3.exe 1 4 2->7         started        11 rundll32.exe 2->11         started        process3 file4 18 C:\Users\user\AppData\Local\...\certutil.exe, PE32+ 7->18 dropped 24 Uses certutil -decode 7->24 13 certutil.exe 3 1 7->13         started        signatures5 process6 signatures7 26 Registers a new ROOT certificate 13->26 16 conhost.exe 13->16         started        process8
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2022-12-21 01:13:08 UTC
File Type:
PE+ (Exe)
Extracted files:
48
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Executes dropped EXE
Unpacked files
SH256 hash:
acb5fd38a1242912e31423cb90abddbd78cb39ed19efe4768b70af99092f1328
MD5 hash:
d2e78f6663b47a7ec04a4d014cab5ff1
SHA1 hash:
d06b863f439c03c20f3600222196cb2465696b21
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe acb5fd38a1242912e31423cb90abddbd78cb39ed19efe4768b70af99092f1328

(this sample)

  
Delivery method
Distributed via web download

Comments



Avatar
zbet commented on 2022-12-21 01:12:20 UTC

url : hxxp://37.77.239.239:8752/krnl_connect.exe