MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 022fd79a45c762f316b480cb4c2d5789a37a13888dbf37a3d63dee123d53314e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | 022fd79a45c762f316b480cb4c2d5789a37a13888dbf37a3d63dee123d53314e |
|---|---|
| SHA3-384 hash: | 7679a817917b187b2550be63ef31e0f72c4b0f6c36d8b18274d08a4a3d9477c642af8809623b904c2442d4a99f41efdd |
| SHA1 hash: | 0ce43b1289e27638ac3daa44541d7b05fc1a4bb5 |
| MD5 hash: | dec23ae7a89a24561d5289fc65bd1978 |
| humanhash: | kitten-green-two-apart |
| File name: | dec23ae7a89a24561d5289fc65bd1978.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 361'472 bytes |
| First seen: | 2022-09-15 18:13:25 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c317da9f6fb91f599af70d4195d9cc37 (2 x RedLineStealer, 2 x Smoke Loader, 2 x DanaBot) |
| ssdeep | 6144:9FuVMTNeyvuCx3t+FwTVcpGs4benmS7rzpiqvBIr9lIgDuSp:XPTEyHxd+FwTsGsbmGTvBIr9ljn |
| Threatray | 7'236 similar samples on MalwareBazaar |
| TLSH | T11974CF10FB90D435F1B712F44ABA83A8B93D3DA05B2595CB62C566EE163C6E4EC30397 |
| TrID | 40.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 17.0% (.SCR) Windows screen saver (13101/52/3) 13.6% (.EXE) Win64 Executable (generic) (10523/12/4) 8.5% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 6.5% (.EXE) Win16 NE executable (generic) (5038/12/1) |
| File icon (PE): | |
| dhash icon | c8d8c8c8e0e4a099 (57 x Smoke Loader, 55 x Amadey, 20 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | RansomwareTest4 |
|---|---|
| Author: | Daoyuan Wu |
| Description: | Test Ransomware YARA rules |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.