MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 1cc9a5335e90cd21fb7cc7f39c7d5e13c55306b875bb9603d1a3479dba3e4d19. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 1cc9a5335e90cd21fb7cc7f39c7d5e13c55306b875bb9603d1a3479dba3e4d19 |
|---|---|
| SHA3-384 hash: | 847d2ea3d49dd436720bdae9d21a9c59c5747fd0bc88911eb03ddf511c5eda9479781c3c81f7ad14650f524f6fef1b03 |
| SHA1 hash: | a10c545fb9410cead3ecb43c2940a1ab8a49a498 |
| MD5 hash: | f98f3cfab75abb321e3141e7e71b0094 |
| humanhash: | idaho-carbon-kitten-leopard |
| File name: | file.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'358'336 bytes |
| First seen: | 2023-06-25 06:53:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 587a23ee0bccf95906f888e2a3c1c6b6 (7 x RedLineStealer) |
| ssdeep | 24576:BAH89Mnnr2Zz/681FUjI0X+iGCC09xfine1tBt8MKOXlxACM5mslAgymbIjH5Dgc:a8KnCz/6hNXRZnfiQtBtD9XlxAz5J6g/ |
| Threatray | 667 similar samples on MalwareBazaar |
| TLSH | T12055AD132995B661D8D3B8B2462F83112F68F7B1AD5F74D9EFA83934903788D6CBB041 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.