MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2ad9d3c12e825dde8a117abc44607f85155d19ddbd630da6378aa19e67f60175. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | 2ad9d3c12e825dde8a117abc44607f85155d19ddbd630da6378aa19e67f60175 |
|---|---|
| SHA3-384 hash: | 063997eb47aa5bdbbbd4f1e8ce29d673dcda32f2918dc6c401dd0d73cfb57da89579169984aaf91991928a6c7547a4d1 |
| SHA1 hash: | 48d3551586c66d15b1b7750e313fbfe67934720e |
| MD5 hash: | 913090fe2276ae84a132e19ddbfaf4e0 |
| humanhash: | solar-march-wolfram-island |
| File name: | 913090fe2276ae84a132e19ddbfaf4e0.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 947'200 bytes |
| First seen: | 2023-07-16 06:50:54 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:oy5DFHE8APRSwmm3Pfxo0dcCzcu/2uUJlK2jFKB/sTrX2hS:vvk83gxo0RzP/RgfTTr |
| TLSH | T1CD1523576AD48032FCF653705CF40BC30B7ABCA048B4972A4795689A1E736D1A672F2F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
c50a0a0c0632f778a2d76a1c0fbea774cff29dff521901d340c4c1b83bc153a7
ed31bae24807908be7919f0db4b714a85ba48477923dafbe9752d2a4958cc248
2ad9d3c12e825dde8a117abc44607f85155d19ddbd630da6378aa19e67f60175
ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d
d461d330536d29393561c34329138bd832927bbd41ecf604f4cac3ffaccd1ad9
588f0d0655ede669b683b138ca3446389a8b2433a9b13676a32dcc726becd5ae
b07c30e9c2f5b9fe74bfb66f2c8682edde02cb68cd4e8a75976cca328e48e60f
ed31bae24807908be7919f0db4b714a85ba48477923dafbe9752d2a4958cc248
2ad9d3c12e825dde8a117abc44607f85155d19ddbd630da6378aa19e67f60175
ca6d56a637f121ee6406def5cf89663c3e54b2e175e98d4469fb3e3a46e190da
8c7a2623ea0bfbad72a17add57243068958fa7289cd1319d5cbc3af84eeac07d
588f0d0655ede669b683b138ca3446389a8b2433a9b13676a32dcc726becd5ae
b07c30e9c2f5b9fe74bfb66f2c8682edde02cb68cd4e8a75976cca328e48e60f
6ade7d6ec7a6381185b43d64ae2429ee9c4ee1ccf584c5bfe5887d96d03e3680
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.