MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d3b3de0873ec25cbee4633ad7f8de8d81ef54a8180d2caea5ceb6183dac794fa. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 4 File information Comments

SHA256 hash: d3b3de0873ec25cbee4633ad7f8de8d81ef54a8180d2caea5ceb6183dac794fa
SHA3-384 hash: d6f2dd7df077849a62a6bc4c11a569b2c268a76b683980354d9a11ae97c1c4da30aa517c5ce458bf3ffa79c939a335c6
SHA1 hash: 331ad33fa2cc86d9da57b4862fb67e5d1bb69eff
MD5 hash: 62cb00d996356b0e2c8278f24a8fd256
humanhash: sink-white-gee-chicken
File name:55755374.exe
Download: download sample
Signature RedLineStealer
File size:568'832 bytes
First seen:2022-03-22 19:22:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 445554923421947cbff896012e27345a (301 x RedLineStealer, 11 x RaccoonStealer, 5 x CoinMiner)
ssdeep 12288:fO7vWbbgoDFUI4fibxQS03ULaHNqrxlKIQNo9I1mcOeOvql7L:8v6ko54okEaHNYK3x1ZOeQqRL
Threatray 5'449 similar samples on MalwareBazaar
TLSH T132C423FE13436943C31A43FC2C46BF1B40DB985BFDF0A7A6636849075A58415FF189A6
Reporter adm1n_usa32
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
215
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
88 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Trojan.Fragtor
Status:
Malicious
First seen:
2022-03-22 19:23:09 UTC
File Type:
PE (Exe)
AV detection:
21 of 42 (50.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:280192618_99 infostealer
Behaviour
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
RedLine
RedLine Payload
Malware Config
C2 Extraction:
193.233.48.234:8160
Unpacked files
SH256 hash:
1b82a860225b8e10f53edac8b6a02789243d612d5436c226f5cd00318e52b2c6
MD5 hash:
c2856da931e522a769f983b1c44c36ea
SHA1 hash:
b2304330f413e18e3a7be746c4c58e7d02fd7a36
SH256 hash:
52f2b6b732c577f012d96c3f148c5cc28e76fe142b714bb5666b46f990070008
MD5 hash:
45f1ddf38b501372b5feecc8dd652702
SHA1 hash:
2b0ca6cb8798bcb174191bdb11719a70c2b2f3d3
SH256 hash:
d3b3de0873ec25cbee4633ad7f8de8d81ef54a8180d2caea5ceb6183dac794fa
MD5 hash:
62cb00d996356b0e2c8278f24a8fd256
SHA1 hash:
331ad33fa2cc86d9da57b4862fb67e5d1bb69eff
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pe_imphash
Rule name:Redline_Stealer_Monitor
Description:Detects RedLine Stealer Variants
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments