MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c37f2c927bb9fa4dbeae35bdb1083a539d7c588ad5d5d1340fcfb686ad653786. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 4 File information Comments

SHA256 hash: c37f2c927bb9fa4dbeae35bdb1083a539d7c588ad5d5d1340fcfb686ad653786
SHA3-384 hash: 22b9c0f9f450802a3722dc2d2114e55e157ffc0d8c1973a27461c58e55974054500298482b5e90a10f88cbb7e505d738
SHA1 hash: 43ddc0040606e20bd56138720d183e0327eb2766
MD5 hash: b255faaeb6c1b6a5730f05678be7b7d9
humanhash: lemon-fix-summer-michigan
File name:24030756.exe
Download: download sample
Signature RedLineStealer
File size:570'880 bytes
First seen:2022-03-19 05:08:29 UTC
Last seen:2022-03-19 06:42:20 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 445554923421947cbff896012e27345a (301 x RedLineStealer, 11 x RaccoonStealer, 5 x CoinMiner)
ssdeep 12288:oxhOkZxcoxCi9fVRvqQS03ULaHNqrxlKIQNoKKQEZrED/OKfd:2Ok/cFi/RvqkEaHNYK3XrP
Threatray 5'317 similar samples on MalwareBazaar
TLSH T16CC423F252863DACD48B0376FF107B52967E111486C8E24FB79E4CB52C89A9EC9E46D0
Reporter adm1n_usa32
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
2
# of downloads :
268
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Connects to many ports of the same IP (likely port scanning)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found malware configuration
Injects a PE file into a foreign processes
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
PE file has nameless sections
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2022-03-19 05:09:12 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
23 of 27 (85.19%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  3/10
Tags:
n/a
Behaviour
Program crash
Unpacked files
SH256 hash:
27c5e2527ff957cbd3f2c728e655137773007446f6ed7373355685b3ce65f60f
MD5 hash:
a0915fb31134c1608251cbedb8cc4921
SHA1 hash:
08b8bd6afb7bd209794930bcb013925f149c826f
SH256 hash:
433293737faa0055a9d13bf6e0d9f6dbed1662a5e6e52b6b8bcf740a9be3fd17
MD5 hash:
95ebc21c332f56df406d5434e701cdd2
SHA1 hash:
1ca36f59a4bdf83a8cd8e6a17aea9b7071d08a41
SH256 hash:
c37f2c927bb9fa4dbeae35bdb1083a539d7c588ad5d5d1340fcfb686ad653786
MD5 hash:
b255faaeb6c1b6a5730f05678be7b7d9
SHA1 hash:
43ddc0040606e20bd56138720d183e0327eb2766
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments