MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ba244c534e6a0eedb496e840881c5401c3640fc317b601da17ca84570e1e181a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: ba244c534e6a0eedb496e840881c5401c3640fc317b601da17ca84570e1e181a
SHA3-384 hash: ef98a216d83042d8dc33d0c6369080a828016dcbba71dda06c73378fe632337ef2906663a2648838050dfc705d2f7e40
SHA1 hash: 05906fec03cc0f32c06c05b2c289b903ace13a0e
MD5 hash: f26158c3fd67516d7e6fb4bf702718e1
humanhash: fish-football-bakerloo-burger
File name:f26158c3fd67516d7e6fb4bf702718e1.exe
Download: download sample
Signature RedLineStealer
File size:588'288 bytes
First seen:2020-06-28 10:11:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f5e0bf7fe050d30fcd2974a61b920811 (3 x RedLineStealer)
ssdeep 12288:k9fkHfouoKTJvkR/uOPL+WN4jdJzFft4ittH/gsAt/O:k9afouoKNvq/ZPLDNqxF47BO
Threatray 39 similar samples on MalwareBazaar
TLSH 49C412233D9DF178C462777C5472C671167A7822753092AB3A982B3FEE70790AE32725
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request to an infection source
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-06-28 10:13:04 UTC
AV detection:
27 of 31 (87.10%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
evasion spyware trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments