MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2d38fac7d02a4d32b8579c25ec1ce2d6bb14bc27d846874ad6f1897ca21889cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | 2d38fac7d02a4d32b8579c25ec1ce2d6bb14bc27d846874ad6f1897ca21889cd |
|---|---|
| SHA3-384 hash: | cf6a60411a04e8873ee138c28be66c8204603b81ad8cfaf6cfaf515936723c4153673867e120ef0a0a3f788ed34201dd |
| SHA1 hash: | 0d5a4030a841a8a77c130f6689712e24aaa9a674 |
| MD5 hash: | 8b2612c44a0951e150dc47ba2741d26e |
| humanhash: | pasta-montana-island-connecticut |
| File name: | 2d38fac7d02a4d32b8579c25ec1ce2d6bb14bc27d846874ad6f1897ca21889cd |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 788'480 bytes |
| First seen: | 2025-01-10 14:32:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger) |
| ssdeep | 12288:uIR4R52J+XtLKxw9rbrramF93MFTzEiBBs/iTxAKnAHORfoO9FHF9jD7Qx1MxQh:uIeew9rbKmF93MxzRTqKnYOBvHPO |
| TLSH | T1B0F402A8BA42C846DC0153740D76F5B416696FECF411931F2BDA7FABFCB3A13049A246 |
| TrID | 69.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.0% (.EXE) Win64 Executable (generic) (10522/11/4) 6.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.2% (.EXE) Win32 Executable (generic) (4504/4/1) 1.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) |
| Magika | pebin |
| File icon (PE): | |
| dhash icon | 79e4e4ccccc4c4c0 (11 x Formbook, 9 x RedLineStealer, 3 x AgentTesla) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
HUVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Detect_PowerShell_Obfuscation |
|---|---|
| Author: | daniyyell |
| Description: | Detects obfuscated PowerShell commands commonly used in malicious scripts. |
| Rule name: | detect_Redline_Stealer_V2 |
|---|---|
| Author: | Varp0s |
| Rule name: | GenericRedLineLike |
|---|---|
| Author: | Still |
| Description: | Matches RedLine-like stealer; may match its variants. |
| Rule name: | MALWARE_Win_MetaStealer |
|---|---|
| Author: | ditekSHen |
| Description: | Detects MetaStealer infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | RANSOMWARE |
|---|---|
| Author: | ToroGuitar |
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | RedLine_Stealer_unpacked_PulseIntel |
|---|---|
| Author: | PulseIntel |
| Description: | Detecting unpacked Redline |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Sus_Obf_Enc_Spoof_Hide_PE |
|---|---|
| Author: | XiAnzheng |
| Description: | Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP) |
| Rule name: | Windows_Generic_Threat_efdb9e81 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_Generic_40899c85 |
|---|---|
| Author: | Elastic Security |
| Rule name: | Windows_Trojan_RedLineStealer_6dfafd7b |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.