MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 101e6d28a5cb1216e2700a4236cb81df4a7e422e404c80bfb86462bdfef78ba9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | 101e6d28a5cb1216e2700a4236cb81df4a7e422e404c80bfb86462bdfef78ba9 |
|---|---|
| SHA3-384 hash: | a2ac021ea1e4c767b0c19603e9deaceb932bd237e9dd4dd64a4cb8e2535f70f7ade89cab6740b6d900561b2f432fe917 |
| SHA1 hash: | 2db5fdb287e16201a4d7612e5593acffff0a0848 |
| MD5 hash: | dd08112ba8942c14db848019368ed40d |
| humanhash: | carolina-lima-johnny-cola |
| File name: | dd08112ba8942c14db848019368ed40d.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 712'704 bytes |
| First seen: | 2023-04-25 12:35:35 UTC |
| Last seen: | 2023-05-13 22:49:18 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1efe015ade03f54dd6d9b2ccea28b970 (268 x RedLineStealer, 256 x Amadey, 2 x GuLoader) |
| ssdeep | 12288:ty904sMhGxdVU0uugGGx/qsvi8NU15z/kkxW6Yn0:tyi9wNDBqs68Ni5z/kK/Yn0 |
| Threatray | 132 similar samples on MalwareBazaar |
| TLSH | T1FFE41253A3D89132C9F41B7068F912D30636BCA2DAB587EB3789998E5DB31C0943176F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | MAL_Malware_Imphash_Mar23_1 |
|---|---|
| Author: | Arnim Rupp |
| Description: | Detects malware by known bad imphash or rich_pe_header_hash |
| Reference: | https://yaraify.abuse.ch/statistics/ |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.