MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 11165cc19fe8a06b86ef467a5fa36e6db600d76029ab99cac69f16ebf68043da. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | 11165cc19fe8a06b86ef467a5fa36e6db600d76029ab99cac69f16ebf68043da |
|---|---|
| SHA3-384 hash: | ee7b349908ea50e24c12536c37abff2b95172cec05a47c8efc20839d23b35606d7124d29393d3e0abfe5cf7b62ce6806 |
| SHA1 hash: | c229b98b73a3c504d7436b0c70f46df4460718af |
| MD5 hash: | 54d3e951cc3031df54c2f1d935cc6a95 |
| humanhash: | chicken-oxygen-spaghetti-football |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 401'920 bytes |
| First seen: | 2022-10-28 10:41:15 UTC |
| Last seen: | 2022-10-28 11:28:22 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0ba783a390ae174dbc5807c6f3d204ef (6 x RedLineStealer, 4 x ArkeiStealer, 3 x Amadey) |
| ssdeep | 6144:cZmH0LtMJgbnDNYaklk2OjrRhjeekzIoEKo9jdnezSsWTweVdT:cZmH0RWgbBTklwvmz+d9dezSsWTxVdT |
| Threatray | 9'690 similar samples on MalwareBazaar |
| TLSH | T17684F13671A3C4B2C48661790419CFA42EBFF8311566464737A83B7E9E313C296BA71F |
| TrID | 40.3% (.EXE) Win64 Executable (generic) (10523/12/4) 19.3% (.EXE) Win16 NE executable (generic) (5038/12/1) 17.2% (.EXE) Win32 Executable (generic) (4505/5/1) 7.7% (.EXE) OS/2 Executable (generic) (2029/13) 7.6% (.EXE) Generic Win/DOS Executable (2002/3) |
| File icon (PE): | |
| dhash icon | 3030b169e0ccced6 (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 193.106.191.21:47242 | https://threatfox.abuse.ch/ioc/952418/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.