MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e64b645ea5e49d9ae5b7faf331a14818856f381d2d61c95a0856c1bb25028341. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 3
| SHA256 hash: | e64b645ea5e49d9ae5b7faf331a14818856f381d2d61c95a0856c1bb25028341 |
|---|---|
| SHA3-384 hash: | ad6def73f62d9c6ce7ae11f20ee438e4087283cd07bde1e5641cfdc377efeb63486000188f70bcf9ac3237c2fe8be035 |
| SHA1 hash: | 2c3744e4e6818e7289c4cebc1ef8c70c746891be |
| MD5 hash: | 12a329bc5f57994a2441e2eaf1e3d9c2 |
| humanhash: | speaker-nine-bacon-september |
| File name: | Arrival notice ETA 19th .r15 |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 361'694 bytes |
| First seen: | 2021-07-14 14:49:47 UTC |
| Last seen: | Never |
| File type: | rar |
| MIME type: | application/x-rar |
| ssdeep | 6144:8Sr4xld2o1yxqZJDNA3IPACwt2hjWoDdE0oI8v2ZFzSsOGabmxt704t10:hr4yxqdF4COAjWoDFoI8u7p1a8Vt10 |
| TLSH | T1627423EF1D4F24CE199AD622839365D02C5C6F7F5C0C115F9EF8E381847E29AE246E92 |
| Reporter | |
| Tags: | INVOICE r15 rar RedLineStealer |
cocaman
Malicious email (T1566.001)From: "info@haysshipping.com" (likely spoofed)
Received: "from haysshipping.com (unknown [45.137.22.139]) "
Date: "14 Jul 2021 15:33:05 +0200"
Subject: "ARRIVAL NOTICE & INVOICE ETA 19th JULY 2021"
Attachment: "Arrival notice ETA 19th .r15"
Intelligence
File Origin
# of uploads :
1
# of downloads :
96
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Trojan.GenericML
Status:
Malicious
First seen:
2021-07-14 14:50:07 UTC
File Type:
Binary (Archive)
Extracted files:
8
AV detection:
9 of 29 (31.03%)
Threat level:
5/5
Detection(s):
Suspicious file
Result
Malware family:
n/a
Score:
3/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.38
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.