MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e457b29f4284228a96888af4fcd0478084802e48afca814cb203c279d796af33. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: e457b29f4284228a96888af4fcd0478084802e48afca814cb203c279d796af33
SHA3-384 hash: 954304ecfcb3f8403185ac9e719f47f48c042a30a0760fb634f208908453f8483258de2b5ba3d47d1159123fc8652fd9
SHA1 hash: adb41e909aabd4c8da540ad3fcaa0707a572df90
MD5 hash: 7e9859af52934104dcef198cfb5b9ace
humanhash: virginia-minnesota-skylark-sweet
File name:Tomoshiko Launcher.exe
Download: download sample
Signature RedLineStealer
File size:7'227'392 bytes
First seen:2022-11-13 13:36:15 UTC
Last seen:2022-11-13 15:40:21 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 794bae95de361328fffbc778809f6c51 (1 x RedLineStealer)
ssdeep 196608:/yEF/3a1c80FBgu88WY86RhpP/e6yYYlexAYZqoBKKWqc54xt0:/yEFvJ80bgd8i6t/YzlexA+qoWiS
Threatray 719 similar samples on MalwareBazaar
TLSH T18B762353526A0249E1E4CDBFD527BDD530F7134ACB42BC7A61BEBEC125329A8E213643
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 74781e171796b431 (1 x RedLineStealer, 1 x AsyncRAT)
Reporter iamdeadlyz
Tags:exe FakeTatsumeeko RedLineStealer Tomoshiko


Avatar
Iamdeadlyz
From tomoshiko.io (impersonation of tatsumeeko.com)
RedLineStealer C&C: 77.73.134.13:3660

Intelligence


File Origin
# of uploads :
2
# of downloads :
168
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
Tomoshiko Launcher.exe
Verdict:
Malicious activity
Analysis date:
2022-11-13 13:39:00 UTC
Tags:
trojan rat redline

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Sending a custom TCP request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Creating a window
Creating a file
Forced shutdown of a system process
Unauthorized injection to a system process
Stealing user critical data
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 744955 Sample: Tomoshiko Launcher.exe Startdate: 13/11/2022 Architecture: WINDOWS Score: 48 17 Machine Learning detection for sample 2->17 6 Tomoshiko Launcher.exe 2->6         started        process3 signatures4 19 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 6->19 9 AppLaunch.exe 6->9         started        11 AppLaunch.exe 6->11         started        13 AppLaunch.exe 6->13         started        15 36 other processes 6->15 process5
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2022-11-13 13:37:18 UTC
File Type:
PE (Exe)
Extracted files:
5
AV detection:
21 of 26 (80.77%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Accesses cryptocurrency files/wallets, possible credential harvesting
Verdict:
Informative
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
e457b29f4284228a96888af4fcd0478084802e48afca814cb203c279d796af33
MD5 hash:
7e9859af52934104dcef198cfb5b9ace
SHA1 hash:
adb41e909aabd4c8da540ad3fcaa0707a572df90
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe e457b29f4284228a96888af4fcd0478084802e48afca814cb203c279d796af33

(this sample)

Comments