MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e8c33c941b4c1f754f9d75d7ba2e2b07441421240877adc557f6b0ee75a5ada3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 12


Intelligence 12 IOCs YARA 1 File information Comments

SHA256 hash: e8c33c941b4c1f754f9d75d7ba2e2b07441421240877adc557f6b0ee75a5ada3
SHA3-384 hash: e1f33f737576a24da68ed923564499475d99bafc13a34d4daa2a47fb423761fa909818faf0239dcdb5618917cd898de3
SHA1 hash: d447ce2a738dd371a536795fd4102047f73535f2
MD5 hash: 08204edf80d6ea11bfa7860187cd2149
humanhash: sad-six-fanta-carolina
File name:08204edf80d6ea11bfa7860187cd2149
Download: download sample
Signature RedLineStealer
File size:372'736 bytes
First seen:2021-10-21 10:33:39 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 79769bf6868dc11b056a4541de90d1fa (3 x RedLineStealer, 1 x Smoke Loader, 1 x TeamBot)
ssdeep 6144:3tlntEO/vU+2W9KDSfmUGFS28AEWwbVn9qVCJlvqxxtKuIADG8el:3jntEO/8ngfmUGFO5h9qeR0KuxD
Threatray 3'985 similar samples on MalwareBazaar
TLSH T17484D08972B8D874D49A0A308835CBE9233F785178205277F3972B6FEEF92809D65357
File icon (PE):PE icon
dhash icon fcfcb4d4d4d4d8c0 (70 x RedLineStealer, 59 x RaccoonStealer, 24 x Smoke Loader)
Reporter zbetcheckin
Tags:32 exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
194
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Connection attempt
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Zenpak
Status:
Malicious
First seen:
2021-10-21 10:34:08 UTC
AV detection:
21 of 28 (75.00%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:paladin infostealer
Behaviour
RedLine
RedLine Payload
Malware Config
C2 Extraction:
188.68.201.6:10085
Unpacked files
SH256 hash:
7c21c9062a7db958d77d87999b45acb158e4a9fe3a4ba6a2b8344e53fb4ec7eb
MD5 hash:
4fc7f1bb975a6921566ea54904428b7a
SHA1 hash:
4f6295a88e5f45beecb251bb524d1fd8dbc0d2e3
SH256 hash:
9a2a3875722f1e7fb6f43f9f9f09e436e336fc2cc69e191c1a77c58d11dd0794
MD5 hash:
8a9215c6383fb76cbddee80ea736099a
SHA1 hash:
aa9dc816b414430eb8852ea7b8d9d565e3050729
SH256 hash:
0908144faf06da499b4c8cd0bdd571cb8f8d490005b12a4ad63b71e1c9ccba2b
MD5 hash:
2445226acfb610cab021fc373cf2d221
SHA1 hash:
c175e1c17fb705a3f6cb168e9c45d5aa03dcdf40
SH256 hash:
e8c33c941b4c1f754f9d75d7ba2e2b07441421240877adc557f6b0ee75a5ada3
MD5 hash:
08204edf80d6ea11bfa7860187cd2149
SHA1 hash:
d447ce2a738dd371a536795fd4102047f73535f2
Malware family:
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe e8c33c941b4c1f754f9d75d7ba2e2b07441421240877adc557f6b0ee75a5ada3

(this sample)

  
Delivery method
Distributed via web download

Comments