MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 0576191c50a1b6afbcaa5cb0512df5b6a8b9bef9739e5308f8e2e965bf9b0fc5 |
|---|---|
| SHA3-384 hash: | a4fdf05a1cb2a0a9941395f3c55aacd3daf3a637ce7618291a9dc1f00951b6e6a5ed2982e5f4573392870630d9c0176d |
| SHA1 hash: | 20d60478d3c161c3cacb870aac06be1b43719228 |
| MD5 hash: | 3b6501feef6196f24163313a9f27dbfd |
| humanhash: | north-sierra-timing-leopard |
| File name: | 3b6501feef6196f24163313a9f27dbfd.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 307'712 bytes |
| First seen: | 2024-08-28 21:05:24 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'744 x AgentTesla, 19'608 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 3072:acZqf7D34Tp/0+mA0kywMlQEg85fB1fA0PuTVAtkxzZ3RMeqiOL2bBOA:acZqf7DItnGCQNB1fA0GTV8kv0L |
| TLSH | T1DF645A5833E8C910DA7F4775D861D67193B0BCA3A552E70B4FC4ACAB3D32740EA50AB6 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10523/12/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 0000000000000000 (872 x AgentTesla, 496 x Formbook, 296 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 212.162.149.53:2049 | https://threatfox.abuse.ch/ioc/1317049/ |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
6cb077ac45cc280c1ace4f4b7f7ec0feb23487074ac50e0113ade7e9509dbb85
ff3bcc4bc70f9e6724fcc0fb36c4f57cc5956136850bd39c9581413f7c4688a9
829026e0d6a6f73f3328bb4aabd5f0e3f063f000cd9d860c051b307e148395d5
78897e2d5b18ff4a71db6703ec5781abedff5794bd79fcee70babd7b0622eef8
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer_V2 |
|---|---|
| Author: | Varp0s |
| Rule name: | GenericRedLineLike |
|---|---|
| Author: | Still |
| Description: | Matches RedLine-like stealer; may match its variants. |
| Rule name: | MALWARE_Win_MetaStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects MetaStealer infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | RedLine_Stealer_unpacked_PulseIntel |
|---|---|
| Author: | PulseIntel |
| Description: | Detecting unpacked Redline |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | SUSP_OneNote |
|---|---|
| Author: | spatronn |
| Description: | Hard-Detect One |
| Rule name: | Windows_Generic_Threat_efdb9e81 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Generic_40899c85 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_RedLineStealer_6dfafd7b |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.