MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 048ade0e2763eeec746bdd88d5888cbf0530516f72348a177fa2ac08af4d7c28. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 048ade0e2763eeec746bdd88d5888cbf0530516f72348a177fa2ac08af4d7c28 |
|---|---|
| SHA3-384 hash: | 9f1937df8dcffad033d38e4094a6cd0008965b6cd6e4e848815ab523b129cd50cfaa7ea10751c18abc17956729c40bfa |
| SHA1 hash: | 970d6010ab6f7ab5eec70e8e54af24a8541b0d98 |
| MD5 hash: | 0c0c767f8d146a9dc4bc413373898d3c |
| humanhash: | blue-ceiling-spaghetti-south |
| File name: | 0c0c767f8d146a9dc4bc413373898d3c.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'016'320 bytes |
| First seen: | 2023-05-11 19:40:40 UTC |
| Last seen: | 2023-05-13 20:19:07 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:Ey6/4RZMB7KDytAgWIz46egke/EJVRl2901n3VMi8QC1pkt:T84e2UWIs6egkvr2w3V8Quk |
| Threatray | 3'288 similar samples on MalwareBazaar |
| TLSH | T117252306B7E840B3DA740B3058FA03931E75BCA2DD68538776A678466C73B81E87573E |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.