MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f643cf2250b1ece8e720df93180962e563c6c1e587f4e42af47e4c26ed4ab861. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 8
| SHA256 hash: | f643cf2250b1ece8e720df93180962e563c6c1e587f4e42af47e4c26ed4ab861 |
|---|---|
| SHA3-384 hash: | a4579b7e366e67ef0938ba19f547df96e3c1e9d7eabe7a58b03ea373c93c2cdebc0055dbed0f99d5be3e06323c088898 |
| SHA1 hash: | 9ba93dbf4b93a7abb3a417f87c0caec21d8b9463 |
| MD5 hash: | 109020f2c96e3a7cf9a25d1beb5ca27c |
| humanhash: | rugby-butter-eighteen-north |
| File name: | 109020f2c96e3a7cf9a25d1beb5ca27c.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 2'399'759 bytes |
| First seen: | 2021-03-30 07:12:33 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | e9c0657252137ac61c1eeeba4c021000 (53 x GuLoader, 26 x RedLineStealer, 17 x AgentTesla) |
| ssdeep | 49152:2h+Ja1ecQlcYlL+35uALXmQJOm/XcMafV8bl+ycVwduVQDHIGJYd7nJWmbo8h:2h5eXlcj3lUlqblbJuKDQnn |
| Threatray | 103 similar samples on MalwareBazaar |
| TLSH | 70B5332135C6D809C601AE31993EEA2C9A620F9554D9BF203BB5B6373EBFC559C1A09C |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
109020f2c96e3a7cf9a25d1beb5ca27c.exe
Verdict:
Malicious activity
Analysis date:
2021-03-30 07:49:25 UTC
Tags:
n/a
Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Detection:
n/a
Result
Verdict:
Malware
Maliciousness:
Behaviour
Creating a file in the %temp% directory
Creating a file
Running batch commands
Creating a process with a hidden window
Creating a window
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Contains functionality to register a low level keyboard hook
Creates processes via WMI
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
Sigma detected: Check external IP via Powershell
Sigma detected: Drops script at startup location
Sigma detected: Suspicious Svchost Process
Submitted sample is a known malware sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Yara detected AntiVM3
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Strictor
Status:
Malicious
First seen:
2021-03-30 05:25:53 UTC
AV detection:
21 of 48 (43.75%)
Threat level:
5/5
Verdict:
malicious
Similar samples:
+ 93 additional samples on MalwareBazaar
Result
Malware family:
n/a
Score:
7/10
Tags:
n/a
Behaviour
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Loads dropped DLL
Unpacked files
SH256 hash:
d3c16112a56249d394c34134e71a6860fba98098f013a84557ba6159e18973d8
MD5 hash:
826f97c7a24ccc418601f78c35ea1f8b
SHA1 hash:
a23ac15198ead14b2040f248ce0335561f65d133
SH256 hash:
c8a70ca8a2f6f6d896269b60b9aa8f0bfa619550b443782ecad6db65e0d5b976
MD5 hash:
e2305ddb5097638677bd8f4ed8850842
SHA1 hash:
b80f2d38e0f22e1ff830c7e52dbedb3ce08bd728
SH256 hash:
fb313118d6b5ba471104483df934b84569370703c8248a341f7ada81197d8e82
MD5 hash:
6f8fd137c7206efaee358be2f1cd06d9
SHA1 hash:
3331fe706268dc19a896c4887d17920a40a3d42e
SH256 hash:
fdccaed76f7279e6b8cc1579dadeed03fa1b8d1adcdfbcac585a68da168366d5
MD5 hash:
8b603b23caf00139206f293eb741a9f0
SHA1 hash:
1cc90aec7ce07b13930fe0c088fe3cd155b3ea07
SH256 hash:
49b7477db8dd22f8cf2d41ee2d79ce57797f02e8c7b9e799951a6c710384349a
MD5 hash:
293165db1e46070410b4209519e67494
SHA1 hash:
777b96a4f74b6c34d43a4e7c7e656757d1c97f01
SH256 hash:
ff1330297fe678fb8c5a22665d7a3f73ecf68c651d1701e750389d81301996c6
MD5 hash:
b45de4813084b8b974109767f954afea
SHA1 hash:
1032527d8975900424df676df58f4798d7157686
SH256 hash:
a6fe62d19b2b0f608fe3367ba5612742b9ff248b91a32b13fe189c891a22a00d
MD5 hash:
729168d16501390f6b7d92edb38886c4
SHA1 hash:
d244dc2a6325b22a02372c2b8e01ef4a3e51d10c
SH256 hash:
f643cf2250b1ece8e720df93180962e563c6c1e587f4e42af47e4c26ed4ab861
MD5 hash:
109020f2c96e3a7cf9a25d1beb5ca27c
SHA1 hash:
9ba93dbf4b93a7abb3a417f87c0caec21d8b9463
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.