MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2885c075025d864d3b77b91bd576e9d5fe83070ad742f31c27acc07bd3fb9955. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | 2885c075025d864d3b77b91bd576e9d5fe83070ad742f31c27acc07bd3fb9955 |
|---|---|
| SHA3-384 hash: | 449ae163e34774d62614323f622491a29930b30850a0d02e6706b00348c417d0ba1cc14fd137836da7659cef644be3c6 |
| SHA1 hash: | 07676384b7f5ea40ee1dc628086af4bb92109101 |
| MD5 hash: | 1ce53a6aa068aee91e137ddd8dc6d205 |
| humanhash: | mirror-kilo-artist-steak |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'390'080 bytes |
| First seen: | 2023-09-18 14:34:08 UTC |
| Last seen: | 2023-09-19 16:54:01 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1e870e4b4919ed70a6295fb438223d93 (5 x RedLineStealer) |
| ssdeep | 24576:Lg1yLp0HmYObxpsiuw/88zk7sEI5tq96:cxHmYObkYvps |
| Threatray | 5 similar samples on MalwareBazaar |
| TLSH | T1A7557C203D9D8232DDE310BB76DCB827855CE0B4172646E7A6B857FEDE206C16B3D582 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
andretavare5
Sample downloaded from https://vk.com/doc52355237_665851882?hash=PHzUF4J6v2b9GrWXpuJui768p2m0Oye72iJHRdZyzYo&dl=4rYa7J3do5cBfI9g13UXe1ZLbyKAgewCHtqV1jKTlRT&api=1&no_preview=1#qqIntelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
27e5e5b03cc0d6a14205c26d63eb7ae0f522f2829f7e94f5524e304147fc1445
ef18e6f222c2c09b7fe21e19ddf9533510deae77e51e63d3c24a9f46e8701c82
2439f74bc9e25492aba7b74e9777554c580fdcc8eb2a1d4cbe1fd83b7839c777
d7090bd33b04f71ac9f01ac7ad9581ea1066a52844b74417d4027ca27475ce72
99550f4b46a2b9b5f6b1e72116e84973ab22cbb2b1f8d2a03dc919db4cb93952
4cd2c0f587430ac6add333d7edf854160e0a4d903edcb7386d6f87d2cbb4b9b5
f028eb7c28f4ad3126755a211a47f206812b182adb4ddb45c225802af1a27eab
2c7e13c2666ebf9ef03bc0d8905e4876d3f3366a6f4ec326880b9db33f197e04
e79fff220e5b914ac939c7db318754c1eef76a534370cf8903f7c4d6960afe58
e9086d430ff782f142e2660ae72526eb2a0468ec0ab01f712f75a07577412017
e6e84acfab6cd72f2d1a8e6847a42324e19669f83a69f51c2d4834eba3b9ee25
a52b1bac7fc89df6491f6528ef4ed0f23b35d7e55b5c133ae6488f3efa80fba5
60447c2bd00cc88d5e91284586fa91357ad5f4b1539949b84b1c204afd456865
3d787306f412bf5a77ec3061ce5acad0606f094734188545c0c493cc3420e3b8
46c2a7ae303529e1b3f695d883c0b0fb0ab0b0cc8bf97a5cf7ae94a4ff20e80c
648aa939a0bb4177d337fe526bbf2b7c70a797fe359c75c7c7658839604a4999
98ef4e193a3bfbad975da685ebb6d334c214f4fa0f5a2e5420bd9ba6dd2c3f60
2885c075025d864d3b77b91bd576e9d5fe83070ad742f31c27acc07bd3fb9955
dbf79d65990a6cf775a6be1bf5d328ec25783fa5f1a518a0e0c85d455104556a
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.