MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f209d0916ddfb26a18d236c030e4cead3691a07e2008964a12b36bf7262ad0d8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: f209d0916ddfb26a18d236c030e4cead3691a07e2008964a12b36bf7262ad0d8
SHA3-384 hash: 4d8706d21dd8dbf1f3a4bdf47970d67cdb2cf370f5f9210a1ae75f6c9ad581aafcc29d4bd14ecae533bacd1dfef7ad34
SHA1 hash: c44fbbf9ca8f6ab69a4f22e16370915174367c24
MD5 hash: a5fa9b2b71d7d7f7cb9c1440b4b90ec0
humanhash: spaghetti-minnesota-mississippi-echo
File name:a5fa9b2b71d7d7f7cb9c1440b4b90ec0.exe
Download: download sample
Signature RedLineStealer
File size:1'474'208 bytes
First seen:2021-08-21 19:42:34 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash ffbb45b6f5c54321e555b15ab01a5aed (1 x RedLineStealer)
ssdeep 24576:agQf8jfctdh6JRDIDJAlPi3278v4ptKvfhvuY4FgIXJNbmPGZtWusXQXbyVVW/DK:pjfk4onOGNIpiWtHszM5tWKHZ2ngJwOY
Threatray 24 similar samples on MalwareBazaar
TLSH T1AD6559B3742D1EB5BBDA1C6790170C0F65B4AC33828FB614B7D46B27C84FE8CA855A16
Reporter abuse_ch
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
143
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
a5fa9b2b71d7d7f7cb9c1440b4b90ec0.exe
Verdict:
No threats detected
Analysis date:
2021-08-21 19:46:14 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
suspicious
Classification:
evad
Score:
25 / 100
Signature
Contains functionality to detect sleep reduction / modifications
Behaviour
Behavior Graph:
behaviorgraph top1 process2 2 Behavior Graph ID: 469261 Sample: jf6kE4lzRY.exe Startdate: 21/08/2021 Architecture: WINDOWS Score: 25 5 jf6kE4lzRY.exe 1 2->5         started        signatures3 12 Contains functionality to detect sleep reduction / modifications 5->12 8 WerFault.exe 23 9 5->8         started        10 conhost.exe 5->10         started        process4
Threat name:
Win32.Trojan.Sabsik
Status:
Malicious
First seen:
2021-08-21 19:43:06 UTC
AV detection:
4 of 46 (8.70%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of NtCreateProcessExOtherParentProcess
Unpacked files
SH256 hash:
f209d0916ddfb26a18d236c030e4cead3691a07e2008964a12b36bf7262ad0d8
MD5 hash:
a5fa9b2b71d7d7f7cb9c1440b4b90ec0
SHA1 hash:
c44fbbf9ca8f6ab69a4f22e16370915174367c24
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe f209d0916ddfb26a18d236c030e4cead3691a07e2008964a12b36bf7262ad0d8

(this sample)

  
Delivery method
Distributed via web download

Comments