Summary | ZeroBOX

ddmc.txt.exe

RedLine stealer .NET framework(MSIL) Malicious Library PE32 PE File
Category Machine Started Completed
FILE s1_win7_x6401 July 12, 2024, 9:44 a.m. July 12, 2024, 9:44 a.m.
Size 678.9KB
Type PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
MD5 ec4eddc1c6478a9b66e1884925326379
SHA256 5a4ad5da35e57e1dc2a26c280acdc9e03da8b8037c198784f6c6a050d972c820
CRC32 5324E17E
ssdeep 6144:BFiDep+oR+FQQIGULMQoyvExtk26rZU/bPmSasbp3D68xBiCJZCdoi/afdEO3n0U:viipf/GaLvEKa6c3DrBFJwcE
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)
  • RedLine_Stealer_b_Zero - RedLine stealer
  • Win32_Trojan_PWS_Net_1_Zero - Win32 Trojan PWS .NET Azorult

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Bkav W32.AIDetectMalware.CS
Lionic Trojan.Win32.Generic.4!c
Elastic Windows.Trojan.RedLineStealer
Skyhigh BehavesLike.Win32.Generic.jh
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
APEX Malicious
Rising Trojan.Generic@AI.99 (RDMK:cmRtazqKFqDfNrwTLBwneO8hHQaV)
McAfeeD ti!5A4AD5DA35E5
Trapmine suspicious.low.ml.score
FireEye Generic.mg.ec4eddc1c6478a9b
Sophos Generic ML PUA (PUA)
Webroot W32.Trojan.Gen
Google Detected
Varist W32/MSIL_Troj.DEJ.gen!Eldorado
BitDefenderTheta Gen:NN.ZexaF.36808.QmZ@a8mlCWp
DeepInstinct MALICIOUS
SentinelOne Static AI - Malicious PE
Fortinet W32/PossibleThreat
CrowdStrike win/malicious_confidence_90% (D)