MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 cb0d1f942e077021cc2fe8cfb688abd294398e407e9f5f851f35fddeb5e30bf9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: cb0d1f942e077021cc2fe8cfb688abd294398e407e9f5f851f35fddeb5e30bf9
SHA3-384 hash: 177b5019b8f34437ce903a3036eb8e3127c03eec5440214b5c229e8cbdc71c2d93106663da4448ad1aa2c7231d18eca0
SHA1 hash: 634c6bbe9c59d58fbca453794d31ddad17ccf291
MD5 hash: 86b4c96c0de59ef8954b67ad024a88c5
humanhash: double-march-hamper-pasta
File name:86b4c96c0de59ef8954b67ad024a88c5.exe
Download: download sample
Signature RedLineStealer
File size:587'776 bytes
First seen:2020-06-28 09:12:27 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f5e0bf7fe050d30fcd2974a61b920811 (3 x RedLineStealer)
ssdeep 12288:O9fkH4rMNPEievrnD92dNOAVFXyjEgFqdAFDGD6sEa4uOeR:O9a4+si0rp2SEKqGaDooZR
Threatray 137 similar samples on MalwareBazaar
TLSH 5AC41223F390F03DC5922571A471F2E16A3A786212E5825B3B982F3F9F746E05D32396
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Sending an HTTP GET request to an infection source
Threat name:
Win32.Trojan.CryptInject
Status:
Malicious
First seen:
2020-06-28 09:14:05 UTC
AV detection:
26 of 30 (86.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
evasion spyware trojan
Behaviour
Checks processor information in registry
Modifies system certificate store
Legitimate hosting services abused for malware hosting/C2
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments