MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e026bc9a0b7ac31a86cdbbd88e2b2be5236ba81b469723007c8b3c1d9461198f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | e026bc9a0b7ac31a86cdbbd88e2b2be5236ba81b469723007c8b3c1d9461198f |
|---|---|
| SHA3-384 hash: | 0804d0277c2fe0f9f040a92cce00282ea65e7244b4b09b1d9bb3241bd85c0e43b3a4a65cdf81bf3d60fd5635d9d7d6ea |
| SHA1 hash: | c0eefb77a322c4fcdd066779e45af74d5470eebf |
| MD5 hash: | f2aa0a939eb31b64e7f57c97dce7298a |
| humanhash: | fix-fifteen-arkansas-quebec |
| File name: | HEUR-Trojan.Win32.Crypt.gen-e026bc9a0b7ac31a8.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 2'678'520 bytes |
| First seen: | 2023-01-25 04:15:19 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c05041e01f84e1ccca9c4451f3b6a383 (141 x RedLineStealer, 101 x GuLoader, 64 x DiamondFox) |
| ssdeep | 49152:Eg/2ozbzXnm3jHSdJWSa+J9dmcQC+/qq+7aqf9fvgS+7HYv1/omI:Jl/3C0Wf+JqcQ7yB7aqZgS+Lyk |
| TLSH | T1B6C533547E23CA73F1826632CC73610B2D7B9028267B4BC73F69ABC1792ED45B056786 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | b2a89c96a2cada72 (2'283 x Formbook, 981 x Loki, 803 x AgentTesla) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
https://shpak125.tumblr.com/
Unpacked files
4ae186f9a645695962b47f37c8b8e64c4d45f2b2a12ae914c01e5ba810a44f00
fe3ae99417e0d632995ad5ceeccc4c0b308b8a30d2c93031f15837b607b8552b
df26b54b984ae1b94fecde99e7b0513a305164f9000929d3467a95d16e33667d
ab479d019576efd4dd391e0bf3fc1bedb10367e1ece7157d609a283873a43645
e026bc9a0b7ac31a86cdbbd88e2b2be5236ba81b469723007c8b3c1d9461198f
e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded
8f8b341230323b995c1cde1d534031092bfddb56411dac43d155e5366681e1c7
ab479d019576efd4dd391e0bf3fc1bedb10367e1ece7157d609a283873a43645
ef0c34580084f9855c1e5c3fa9d902688d400baabc7366c8da9ba3d4b708da49
ec306f0a108c77a02ab48c5c85296c4b3b7d4b690245f9dd8a67df774b641cf8
e3135f01a3b76a91bb1082fd5b53259fe2d59eb6ab550fcc6fa6c866412920f8
e52e6bbf7705f9b90e4a20f2935cb86ee6078035f14d873d1c126c6ba9ccc551
27425ab21814acdc92665957ce92f326a46ea99131ef32df83ccaeaaa5228c20
55f22aa33b837e543e8a58408ed843e41515292dead43b57b2ae42b735c34f11
d0037be72720bb05c0207342411a883b883c8f4a371c6c7e6bacd9cff5615df7
20e1bc5813941642186774cd0aa40989c3d119d7a70b7a6be5d3d8df6185c020
cd53d44c68b4b58f88aa945ca38dd18e0a66c3f0854f5868fbea4345f7819fb4
e026bc9a0b7ac31a86cdbbd88e2b2be5236ba81b469723007c8b3c1d9461198f
e461562a06f4c2cea8cc91d9fc6fd75f393b79030d6463169f71b0ff2f6b7ded
8f8b341230323b995c1cde1d534031092bfddb56411dac43d155e5366681e1c7
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | command_and_control |
|---|---|
| Author: | CD_R0M_ |
| Description: | This rule searches for common strings found by malware using C2. Based on a sample used by a Ransomware group |
| Rule name: | INDICATOR_EXE_Packed_ASPack |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ASPack |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing SQL queries to confidential data stores. Observed in infostealers |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_WindDefender_AntiEmaulation |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables containing potential Windows Defender anti-emulation checks |
| Rule name: | MALWARE_Win_Chebka |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Chebka |
| Rule name: | MALWARE_Win_DLInjector03 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects unknown loader / injector |
| Rule name: | MALWARE_Win_Vidar |
|---|---|
| Author: | ditekSHen |
| Description: | Detects Vidar / ArkeiStealer |
| Rule name: | meth_stackstrings |
|---|---|
| Author: | Willi Ballenthin |
| Rule name: | RedOctoberPluginCollectInfo |
|---|
| Rule name: | SUSP_XORed_MSDOS_Stub_Message |
|---|---|
| Author: | Florian Roth |
| Description: | Detects suspicious XORed MSDOS stub message |
| Reference: | https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings |
| Rule name: | Windows_Trojan_Generic_a681f24a |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Vidar_114258d5 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Vidar_9007feb2 |
|---|---|
| Author: | Elastic Security |
| Rule name: | win_vidar_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.vidar. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.