MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fdc884b306b56d605844a30990a565fed93cbbf6d15c04c524ee606fbb1d8931. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: fdc884b306b56d605844a30990a565fed93cbbf6d15c04c524ee606fbb1d8931
SHA3-384 hash: e6435bddb99c2de0f43e0347a07ad4b2e8a1d401ae60b0f65ad46eb4d4aa6e0397f63b21cfcb7ae962acef1588f467ab
SHA1 hash: f975cb02d4f348ae6cd3fd112b746445bd653e87
MD5 hash: 651026d3f1f58ca2718cac5272a53192
humanhash: romeo-blue-two-tennessee
File name:651026d3f1f58ca2718cac5272a53192.exe
Download: download sample
Signature RedLineStealer
File size:299'008 bytes
First seen:2020-11-04 06:32:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 6cf2578a58c9e41f2d3aa14f2cb646ae (6 x RedLineStealer)
ssdeep 6144:ewblJtOhHAtxrhz6wtT29kSlSeHLd89hXCY9b5y3B/isq2:eaTOhHAtCwc/dHLWnya5/s3
Threatray 201 similar samples on MalwareBazaar
TLSH FD54E000BA60D073C21114748856E2B15AAE6C315FBB8A837BEC7F7F6F223D1567A359
Reporter abuse_ch
Tags:exe RedLineStealer


Avatar
abuse_ch
RedLineStealer C2:
http://medavik.xyz/IRemotePanel

Intelligence


File Origin
# of uploads :
1
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Launching the default Windows debugger (dwwin.exe)
DNS request
Sending an HTTP POST request
Sending a custom TCP request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Creating a window
Creating a file in the %temp% directory
Deleting a recently created file
Reading critical registry keys
Running batch commands
Creating a file
Launching a process
Stealing user critical data
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
RedLine
Detection:
malicious
Classification:
troj
Score:
64 / 100
Signature
Machine Learning detection for sample
May check the online IP address of the machine
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Glupteba
Status:
Malicious
First seen:
2020-11-04 02:28:35 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:agenttesla family:redline discovery infostealer keylogger persistence spyware stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Modifies service
Checks installed software on the system
Looks up external IP address via web service
Reads user/profile data of web browsers
AgentTesla Payload
AgentTesla
RedLine
Unpacked files
SH256 hash:
b5c5cf604294db0798383a06c5d9d75da79185f2095e2f095be680b5eef955d3
MD5 hash:
0ebf88581234ff258338b4796e7248c0
SHA1 hash:
1e0496e2cb8967b5d2a4b5d51dd4043711d220cd
SH256 hash:
40872120eefcae36dbaaa687d94a34cc22c1ec687f42f373915c48dbe67a6223
MD5 hash:
f6e7ee5ec3d7ebbcc23630138c66676f
SHA1 hash:
290fcd110ae2b8bbd8287193c30a31327ee01e67
Detections:
win_redline_stealer_g0
SH256 hash:
7dae9baca76fd5bfb3ca88e33296c2a4cbc58e65f6ceb8d757b4dd0f910e03b3
MD5 hash:
8e34cd87ed307e7577ffd747ecc0187e
SHA1 hash:
f85e03efe6a7669d875f8f66ae6cfb94069daa95
Detections:
win_redline_stealer_g0
SH256 hash:
fdc884b306b56d605844a30990a565fed93cbbf6d15c04c524ee606fbb1d8931
MD5 hash:
651026d3f1f58ca2718cac5272a53192
SHA1 hash:
f975cb02d4f348ae6cd3fd112b746445bd653e87
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RedLineStealer

Executable exe fdc884b306b56d605844a30990a565fed93cbbf6d15c04c524ee606fbb1d8931

(this sample)

  
Delivery method
Distributed via web download

Comments