MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 062bf5eda95fa04c7146882ac1efb5ae43eaee0cd4c121db8c1c2edf9412932b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | 062bf5eda95fa04c7146882ac1efb5ae43eaee0cd4c121db8c1c2edf9412932b |
|---|---|
| SHA3-384 hash: | c80f317aec766af3ead0d8e37fbacff546b626d9d86f4de27b0389f4280334eb17fd8d40fa23e9c848bd6359f1d6a7f3 |
| SHA1 hash: | 9ad6d7fdfda1459be16d4e59547a0d933f7c9551 |
| MD5 hash: | 22b5f7bbf08fd60f2ee850f51efede9e |
| humanhash: | dakota-nuts-one-hotel |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'054'720 bytes |
| First seen: | 2023-07-14 21:21:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:XypmCQ2FZ4/Ldo7RGJawprnjhmJcVGTEq:ivFsLdQRIrjYc7 |
| Threatray | 1'294 similar samples on MalwareBazaar |
| TLSH | T1CA252357A3D41532D6361B7468FA22972F37BC922D7CC2A72747A96D0CF344428B272B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
062bf5eda95fa04c7146882ac1efb5ae43eaee0cd4c121db8c1c2edf9412932b
b6b53c7022ec83f58037dc5fee6d8a5dd71ff675b2851d1ebdaac02d608ebac9
32cc60651dec2800f90bb8b2edcc69b23693b48683cc9c3e4003d8781219c264
1d19268c9e4c8021357af9212150dd8ebf9f5520581d96ef43c7633c69576a79
7ccfc85da5bd6677fe2ecf402b3c8bc9767358d5a8a4e5ea9fd5c87c7739019f
58ac243b45ef87d1d89e4d35343f83b686883c7f9efb2e8b6507bb858ac4c668
fc9f7583e360dc95e7f18587ed3af2dd6075c48165f776834bee2eba329ef3ed
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.