MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 245de48c2a36e7245642be61031a9d5f51ad674dafff7ce02032d1272921d6ca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | 245de48c2a36e7245642be61031a9d5f51ad674dafff7ce02032d1272921d6ca |
|---|---|
| SHA3-384 hash: | f6d0641c427749b0805509e2592a96735c527e7fb9cf3b56133cae72196b9ee154c5c99552443dfc30998820505b4a5f |
| SHA1 hash: | 52bafff99490acf2612d8c7f12ea61401cb2de00 |
| MD5 hash: | dc018d7388f118631031ff19f0bfa583 |
| humanhash: | solar-bacon-bravo-virginia |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 345'544 bytes |
| First seen: | 2023-10-02 09:56:05 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 99b61dfa9e1cf5ee0cff9560ceb6d5d3 (4 x RedLineStealer) |
| ssdeep | 6144:2B8BVY4JWa/YcPgOdVMot8Ix4YyFM4AaTNRe1hjioYw8pdIWVEN5vvVMP0TLLWlw:2sXJWa/YcMothh9mtDkHs8LMLTRXK |
| Threatray | 25 similar samples on MalwareBazaar |
| TLSH | T13D749DD2F4D00A67D7E66DB84FBE9E95123AB1970A612DDB5F602E2B0B1B340850CD37 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
99a116c34f8af8952e90e52769b7f5797e52cde606fc177896a795bddb822264
f1a2190b9f00570d39a24710b7ee16080d0e57ffbde2ce6d53c8f3ab1a0b71f9
4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b
6ec6c79257163a642d28a9987f6c77f76417fd45a57537643cb12595d28e60f6
d9a729c3b6a1d94495761b3c6fc329ef7ffabe8c8fdea534070c7d44e59ea349
3c051fc21ae98fa10313b0e6099c3dd297b65d2223b6c24ab22b7627a8ccc6a6
3325e84a732e61754c18109e5ea93e9a97536af9bb9eaf2358d7c8c7d14a0dc2
d23faa96b5f4d28db30edb4c9379670dc1d7f5befd8f67b8c06a311b61925ed4
c0a53497fc09f48e55acb6098dd067462bc1cfa79da69c3cf240337c81441cee
245de48c2a36e7245642be61031a9d5f51ad674dafff7ce02032d1272921d6ca
b619a632e1960193c43461bc257bf44289790e27a6fc9e0160e78a104661aa25
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Sectigo_Code_Signed |
|---|---|
| Description: | Detects code signed by the Sectigo RSA Code Signing CA |
| Reference: | https://bazaar.abuse.ch/export/csv/cscb/ |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.