MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3891781c731aba59fe043f22e6d310526f30feeedaa30a6319bf5c79a0b983e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 15


Intelligence 15 IOCs YARA 6 File information Comments

SHA256 hash: 3891781c731aba59fe043f22e6d310526f30feeedaa30a6319bf5c79a0b983e2
SHA3-384 hash: 9650f0ec122565c9bee3ad8fbd879092dc2b10ae6f6d6348bc399888693896f143bfc37b5b518ef3c36d447b487796b8
SHA1 hash: c138012043eda35b2ea92f16ee51d54155966e29
MD5 hash: eb8ca19e6f2da86fed19942c70f11ca7
humanhash: five-mockingbird-hotel-xray
File name:dxdiag.exe
Download: download sample
Signature RedLineStealer
File size:2'039'996 bytes
First seen:2025-08-29 13:57:23 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5cdfba68edbb115e7aa5ed6776bb6546 (29 x RedLineStealer, 1 x MassLogger)
ssdeep 49152:Qae4tw4NdbnH9o1ppv3Yagw42Gzq/gtXP:Xhlndo1bv8wzGeYBP
Threatray 580 similar samples on MalwareBazaar
TLSH T1719533579860291DC01DBAF3135DBB0D4620AF0A3270EADC7E2EB7263B7353598625E7
TrID 27.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
20.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
18.6% (.EXE) Win32 Executable (generic) (4504/4/1)
8.5% (.ICL) Windows Icons Library (generic) (2059/9)
8.3% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
Reporter ubc
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
116
Origin country :
US US
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
dxdiag.exe
Verdict:
Malicious activity
Analysis date:
2025-08-29 14:00:12 UTC
Tags:
themida netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
92.5%
Tags:
vmdetect packed virus msil
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for analyzing tools
Searching for the window
Sending a custom TCP request
Creating a file in the %AppData% subdirectories
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
anti-vm microsoft_visual_cc obfuscated overlay packed packed themidawinlicense zero
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-08-18T05:30:00Z UTC
Last seen:
2025-08-18T05:30:00Z UTC
Hits:
~100
Malware family:
Snake Keylogger
Verdict:
Malicious
Verdict:
inconclusive
YARA:
5 match(es)
Tags:
Executable PE (Portable Executable) PE File Layout Win 32 Exe x86
Threat name:
Win32.Trojan.Generic
Status:
Suspicious
First seen:
2025-08-18 13:02:43 UTC
File Type:
PE (Exe)
Extracted files:
17
AV detection:
22 of 36 (61.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  9/10
Tags:
defense_evasion discovery themida trojan
Behaviour
Suspicious use of AdjustPrivilegeToken
System Location Discovery: System Language Discovery
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks whether UAC is enabled
Checks BIOS information in registry
Themida packer
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
bc0061e3f73b568d73c4e07d77365c3e52326b13f5fbab060b6ab31854021f8c
MD5 hash:
af867d824da7455ae2ac6878bb61c3a0
SHA1 hash:
e314784858eaaec694a7ca821c7b6f6fc282aeaa
Detections:
SUSP_OBF_NET_Reactor_Native_Stub_Jan24 INDICATOR_EXE_Packed_Themida MALWARE_Win_RedLine
SH256 hash:
824bdf28a84b3d240092a06514c1f4a174e1cf22df1b771aacf138129e36f5ce
MD5 hash:
d381b00d28dda2de04757b4506f7a4fd
SHA1 hash:
3ac95c4b9b1c30b37e2021c28918588e2c31d875
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
2692ada1821aa32a923f7020322eb8b9b5b5d1b7835afa81f9f375772002537d
MD5 hash:
c7e820eea7196598df1c13c4bea19571
SHA1 hash:
67f33d7e965feb49de20ad776a498bdb17e79847
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
3891781c731aba59fe043f22e6d310526f30feeedaa30a6319bf5c79a0b983e2
MD5 hash:
eb8ca19e6f2da86fed19942c70f11ca7
SHA1 hash:
c138012043eda35b2ea92f16ee51d54155966e29
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:INDICATOR_EXE_Packed_Themida
Author:ditekSHen
Description:Detects executables packed with Themida
Rule name:NET
Author:malware-lu
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:vmdetect
Author:nex
Description:Possibly employs anti-virtualization techniques

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments