MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 c7a5001c2ba52418531e60d06072f4130bb9eabbba600f39a90521479ed3f1f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: c7a5001c2ba52418531e60d06072f4130bb9eabbba600f39a90521479ed3f1f8
SHA3-384 hash: b8c580fa2b03d9b3d0a195a01455be64f9d1b6668d0f6b39f20845db388868fc1e0dfa0ecc2fe9a56411987607ecc858
SHA1 hash: 8786fed9bfb948767cd3170b1a7fa00db6d79fe9
MD5 hash: c61e8f7c7ea0a25c2dcb8a73d7aec241
humanhash: social-arizona-avocado-missouri
File name:install.exe
Download: download sample
Signature RedLineStealer
File size:167'936 bytes
First seen:2022-10-09 06:24:35 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4cea7ae85c87ddc7295d39ff9cda31d1 (85 x RedLineStealer, 74 x LummaStealer, 62 x Rhadamanthys)
ssdeep 3072:bahKyd2n3165GWp1icKAArDZz4N9GhbkrNEkO5CO:bahOqp0yN90QEP
Threatray 2'819 similar samples on MalwareBazaar
TLSH T1EFF36C4663F42166F5F6677598F202934A32BCA19B75C2EF1284D57E0E33AC0E931B27
TrID 83.7% (.CPL) Windows Control Panel Item (generic) (197083/11/60)
7.0% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
4.4% (.EXE) Win64 Executable (generic) (10523/12/4)
2.1% (.EXE) Win16 NE executable (generic) (5038/12/1)
0.8% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader)
Reporter JAMESWT_WT
Tags:afterburner-msi exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
313
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://fermia.online/MSIAfterburner.msi
Verdict:
Malicious activity
Analysis date:
2022-10-09 06:23:14 UTC
Tags:
loader trojan stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Running batch commands
Creating a process with a hidden window
Launching cmd.exe command interpreter
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
60%
Tags:
advpack.dll rundll32.exe setupapi.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 718991 Sample: install.exe Startdate: 09/10/2022 Architecture: WINDOWS Score: 48 18 Multi AV Scanner detection for submitted file 2->18 8 install.exe 1 3 2->8         started        process3 process4 10 cmd.exe 2 8->10         started        process5 12 cmd.exe 1 10->12         started        14 conhost.exe 10->14         started        process6 16 conhost.exe 12->16         started       
Result
Malware family:
n/a
Score:
  6/10
Tags:
persistence
Behaviour
Suspicious use of WriteProcessMemory
Adds Run key to start application
Unpacked files
SH256 hash:
c7a5001c2ba52418531e60d06072f4130bb9eabbba600f39a90521479ed3f1f8
MD5 hash:
c61e8f7c7ea0a25c2dcb8a73d7aec241
SHA1 hash:
8786fed9bfb948767cd3170b1a7fa00db6d79fe9
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments