MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 17c3b4a77181d9fec2839f539f37f5828774edc7ce334f8b14ed4a400624bd62. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 17c3b4a77181d9fec2839f539f37f5828774edc7ce334f8b14ed4a400624bd62 |
|---|---|
| SHA3-384 hash: | 483f40d5f82d69e0246559989d36fd4bc355e22fc21b2eec02348238b378cd38fc498dc33a0c788623d88b58f79545df |
| SHA1 hash: | 6ed950979b2497f066ef38af033fd4c6e7b7c8f0 |
| MD5 hash: | b7b102bcebc6cdf0ea11bfa0710a323d |
| humanhash: | bacon-gee-timing-autumn |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'175'040 bytes |
| First seen: | 2023-05-13 09:18:15 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:GyKaXKmRsV2eHnB9Oc+7HqSP3krKG4Nb717sRV6pLzG3:VKaXq0eHBZ+LJP3kKGaX17sREpG |
| Threatray | 337 similar samples on MalwareBazaar |
| TLSH | T137452302E6CA5132E9F157719CF353831A31BC728CB4E29B7B81B81E49B37949932767 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
2a8b129852665480672fdc9383c03bb4359b33c3c3b058aa9f503410ab8c8b8a
ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0
bcdc70c860f3772af96cbf35f4f33e04540489c86fbfbcf9c1df8fb2b0f10daa
bfa12b1c6e5f3c58b25ab7463050c395c92123ed5a282e8b37f2d600a8ad4adb
c30b4fb833c6e6c5cc0307e82746de060e08980c10d9113fbcf16324ed43841f
d1d0f16a62ef41e98a1dc2c65953c623a01e5e12ee7a6bdbed8a1ad25e188c64
d7d08809eeaaa72b382638d6facf28eac7c31e9fa7b385285784929c8fbb8aa6
d8fc27a3a73f3add555c9e6e63fa933e72038548af1e341323c3d7569e48636f
dcfa688395b63f54f26bb2d6df4bbdac7fbacd7a29f6abee3c03233119846a2e
dfa50aec7acb8553aedf43e2ab3dcc1b226895326d631de2acd1714b89d53794
e2b2664bc1ae0bc34326e2a4bd6b4699afe2401c8ef72858e1dc9c21972cdbf0
e4e4cb6303b8e4b7f52439a5fd470d1d362850b4cfe0491af1152c89f70bf0c6
ea7ab7d36e5120a8a3f25e0a9a4b87c28f535c7ca3d1f34f05bc188d8a6c44df
eeed49d3b75a71792b11ed9e714e0d9dd0730336811ca26f8ac9c742d548a15e
f00ef46391f8c6228eac11439ab8020d8111bcde4944978eddc89952663125bc
f3d6748b88f45598e4db85b3d2bd9c98532da20152703d50f74619354ab997ab
f6e43abf63a28725b10b89c1351e85ae417981d372b450fd81b05ec655c0a252
fb22147ec9bdac2010950c88bb5253729eab2fccaea5761c290aac89aefc3893
ffcdbeb2750ad3f9e667de2c513c025a2e5920af2677bcebc9d09d7f694e7731
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_amadey_a9f4 |
|---|---|
| Author: | Johannes Bader |
| Description: | matches unpacked Amadey samples |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.