MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3121319197d74f5566275fed514d2fcc301bba22c7c687946401c9feaed2667f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 14
| SHA256 hash: | 3121319197d74f5566275fed514d2fcc301bba22c7c687946401c9feaed2667f |
|---|---|
| SHA3-384 hash: | 5d0407aad3dc73107552ef37b2e4c8cd8480da8119954007b9d0d60feed4840e8b419326156bda0ae7c3aacc9ff20de5 |
| SHA1 hash: | 8fda4b5d42ed10c6d1c7021e70498233b33713f0 |
| MD5 hash: | cf15fbdc9ee423a036182972c85601ad |
| humanhash: | vegan-aspen-october-earth |
| File name: | cf15fbdc9ee423a036182972c85601ad.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 395'776 bytes |
| First seen: | 2022-12-24 18:30:28 UTC |
| Last seen: | 2022-12-24 19:29:44 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 81084ac57f5d38e75d3a63cf80f4122a (5 x RedLineStealer) |
| ssdeep | 12288:+RRMyUvkLk2zVcOjZh1rskSnQ4DJW0Wrf0S+n9dDuu788Xzwlrz2lB4ung2oonKo:+RWvr8B1skSnQ4DJW0Wrf0S+n9dDuu7D |
| Threatray | 1'896 similar samples on MalwareBazaar |
| TLSH | T190848CC37081847DD52D0EF58AB096A407E9263DCA26FEDF5BFF1E6B4E203AD811055A |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | Win32_Trojan_RedLineStealer |
|---|---|
| Author: | Netskope Threat Labs |
| Description: | Identifies RedLine Stealer samples |
| Reference: | deb95cae4ba26dfba536402318154405 |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.