MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f6a64cd4e4b11b8bd9b8b48915ee43cc600ed17715bd33710502de15a3d7ed74. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 4
| SHA256 hash: | f6a64cd4e4b11b8bd9b8b48915ee43cc600ed17715bd33710502de15a3d7ed74 |
|---|---|
| SHA3-384 hash: | 5596daa76a8e8053a3db7f2e79a5075557e9f560f01bdaae9e15b4857ebe343c91449a8644df39e29952346df926722a |
| SHA1 hash: | 27b3335e024d0f158c8771f500f4f9ff8370c6e6 |
| MD5 hash: | 841c7ce6ad618da99ee4159694f286fe |
| humanhash: | august-cola-carpet-carolina |
| File name: | E-invoicing_17_01_2021_804614300125.cab |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 8'584 bytes |
| First seen: | 2021-01-18 18:15:35 UTC |
| Last seen: | Never |
| File type: | cab |
| MIME type: | application/vnd.ms-cab-compressed |
| ssdeep | 192:Qr856shQflcuIf78EnZSuOQN1i7VpxsuYRGO7uj0lmTUO1:w856shQfeTFcuOQq7L+R7uwl6b |
| TLSH | B402AF2B6C2C9819774F3D7C24A5C55DDE3217F117B1CC3606846DE9D22D4691F48E71 |
| Reporter | |
| Tags: | cab TNT |
abuse_ch
Malspam distributing unidentified malware:HELO: server40.happybyte.gr
Sending IP: 94.130.204.38
From: TNT Express <info@princelia.com>
Reply-To: noreply@tnt.com
Subject: 电子发票-E-invoicing_17_01_2021_804614300125
Attachment: E-invoicing_17_01_2021_804614300125.cab (contains "E-invoicing_17_01_2021_804614300125.exe")
Intelligence
File Origin
# of uploads :
1
# of downloads :
120
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
MALICIOUS
Threat name:
ByteCode-MSIL.Trojan.Generic
Status:
Suspicious
First seen:
2021-01-18 18:16:07 UTC
AV detection:
9 of 46 (19.57%)
Threat level:
5/5
Detection(s):
Suspicious file
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Suspicious File
Score:
0.35
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Malspam
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.