MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ea6331c91a2d000a52fdc46b32dcc7417141bac3e4f04eaf5d8459e176d93d13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs 1 YARA File information Comments

SHA256 hash: ea6331c91a2d000a52fdc46b32dcc7417141bac3e4f04eaf5d8459e176d93d13
SHA3-384 hash: 73e4ea0c5397d0a07ee46803d207a0e1bb8030d478932f29d14fb6b345c2d0dd4d5257bcf4910bf6b6c6510425e2637d
SHA1 hash: 511a6b5630c83d9d8f2345609ca060cfd4891096
MD5 hash: 01db6ba8346e38e35f81418c54ce716d
humanhash: four-item-romeo-timing
File name:01db6ba8346e38e35f81418c54ce716d.exe
Download: download sample
Signature RedLineStealer
File size:417'280 bytes
First seen:2022-02-07 11:11:06 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash b8b949414a1cbbc9af7d834ae8be805f (11 x RedLineStealer, 5 x RaccoonStealer, 4 x ArkeiStealer)
ssdeep 12288:gwbu3YatYbL/W0dK/lGRgOUqmq9kR6lhKXvlmSFtdVl/lnX0J:gwa3/SrDK/cRgOnmq9g6GmSFtflE
Threatray 4'441 similar samples on MalwareBazaar
TLSH T19C94231D27CBB257D29DBBB264B1FB4F1B9CF18334C19B405B84B66FF8089247A0511A
Reporter abuse_ch
Tags:exe RedLineStealer

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
5.206.227.107:11552 https://threatfox.abuse.ch/ioc/382080/

Intelligence


File Origin
# of uploads :
1
# of downloads :
83
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Launching a process
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending a custom TCP request
Unauthorized injection to a system process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj.evad
Score:
96 / 100
Signature
Allocates memory in foreign processes
Found malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
PE file has nameless sections
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Writes to foreign memory regions
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLineStealer
Status:
Malicious
First seen:
2022-02-07 11:12:12 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Drops file in Windows directory
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
0d15c8e85097ae4f25cce2bddd8f7b5bb796c3ccab79d3b9bbd4ccee8f902b66
MD5 hash:
b205aa78411047e9a2115ae08014e26f
SHA1 hash:
91aed2645e9d9a627a42586e80e317f750b4608b
SH256 hash:
ea6331c91a2d000a52fdc46b32dcc7417141bac3e4f04eaf5d8459e176d93d13
MD5 hash:
01db6ba8346e38e35f81418c54ce716d
SHA1 hash:
511a6b5630c83d9d8f2345609ca060cfd4891096
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments