MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 b0b851f99f1cc076735446c7604066a790017d08654f864851622781847ea92e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 9


Intelligence 9 IOCs 1 YARA File information Comments

SHA256 hash: b0b851f99f1cc076735446c7604066a790017d08654f864851622781847ea92e
SHA3-384 hash: 80cf9435b9afb4dce97c40df44f7a655fd6d0bcaa41c7f57cd343d39051704db60ba1088ce3f96c1067a61bbbf7b06ee
SHA1 hash: 9436f161cad83e3cfddfe40e49e69b3ddd1f6b63
MD5 hash: a028198b84610db467785198653babfa
humanhash: muppet-five-ack-uranus
File name:a028198b84610db467785198653babfa.exe
Download: download sample
Signature RedLineStealer
File size:2'923'201 bytes
First seen:2021-07-27 09:55:31 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash fcf1390e9ce472c7270447fc5c61a0c1 (863 x DCRat, 118 x NanoCore, 94 x njrat)
ssdeep 49152:J84p0D/dPoSiACDoVa7i58KcMDVFsld2D38hguVlcplz9dewCqE1EZ5G1:JWREAH+i55coKd2D343alK9qX5W
Threatray 785 similar samples on MalwareBazaar
TLSH T13CD52303BC8659B3D0B1583215297B6539797C200F189BEBF3D42A1EA8391C17B35BAB
dhash icon 9494b494d4aeaeac (832 x DCRat, 172 x RedLineStealer, 134 x CryptOne)
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
193.38.235.12:29867

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
193.38.235.12:29867 https://threatfox.abuse.ch/ioc/163033/

Intelligence


File Origin
# of uploads :
1
# of downloads :
126
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a028198b84610db467785198653babfa.exe
Verdict:
Suspicious activity
Analysis date:
2021-07-27 09:58:56 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Searching for the window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Gathering data
Threat name:
ByteCode-MSIL.Infostealer.Reline
Status:
Malicious
First seen:
2021-07-25 14:52:26 UTC
AV detection:
21 of 46 (45.65%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Modifies Internet Explorer settings
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of SetWindowsHookEx
Unpacked files
SH256 hash:
b0b851f99f1cc076735446c7604066a790017d08654f864851622781847ea92e
MD5 hash:
a028198b84610db467785198653babfa
SHA1 hash:
9436f161cad83e3cfddfe40e49e69b3ddd1f6b63
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments