MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3155ff7ac3d290b13e8285c7601a61eee1f77740f353f4e18e71bed0ff1271e5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | 3155ff7ac3d290b13e8285c7601a61eee1f77740f353f4e18e71bed0ff1271e5 |
|---|---|
| SHA3-384 hash: | 6888afe2f7744356d9f09795d263ed06709e4d2adf0aa3ed435d184268e0103eba4ecf9425f1761570af0c01a04e99a2 |
| SHA1 hash: | 286adf90429fd73c4b947a8bd10148561aae47d5 |
| MD5 hash: | 9de410e1eea7926f068a5ecb7f26898f |
| humanhash: | speaker-asparagus-mountain-uranus |
| File name: | 9de410e1eea7926f068a5ecb7f26898f.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 437'760 bytes |
| First seen: | 2023-01-10 06:20:22 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 213d96de9d9d571c94c2ef33b9682892 (14 x Smoke Loader, 13 x RedLineStealer, 9 x Tofsee) |
| ssdeep | 6144:S8E/6lfZU5Yj6KQWOwyy1KU7t1nsPanNgBSsSvdBA0Xv9aDJY:S/ylK/Kv/Z1XqSsYVaD |
| TLSH | T12694DF11F6A1D472C50E81794C09FBD0AE7FB8315D64EAE72F78576F29F02A0972222D |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | bcbc849494848cc0 (2 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
20df2f3e5302aa0059965c6084d31e343e838426820038391b1d43a9fc35aca4
be05d001029e8cace37f5bb94857b0827f812b89d5ab6d1c7f0bf34110413065
5954eac580fa2c454e03ee55567eab4e46f30b3deac01e3eb02511cc7df8d425
07fc6d5726753bc3c767d46e0e8cf321dcdcd6698e19f398f778c1dda68f6c4b
3155ff7ac3d290b13e8285c7601a61eee1f77740f353f4e18e71bed0ff1271e5
19fd7a55e2d05dc81f96d595fce999549ebbdab42c6a021727b11b2bd30821fd
20df2f3e5302aa0059965c6084d31e343e838426820038391b1d43a9fc35aca4
be05d001029e8cace37f5bb94857b0827f812b89d5ab6d1c7f0bf34110413065
f64fe7e3b268fe91d619c385ca88fa17e0c9b6fe431b2e1f229bb232084154ac
5954eac580fa2c454e03ee55567eab4e46f30b3deac01e3eb02511cc7df8d425
2a0d42a5e07305be35fd54dcf803a4f6ba30652b678ee3197377c6f674a0738b
07fc6d5726753bc3c767d46e0e8cf321dcdcd6698e19f398f778c1dda68f6c4b
ceb6bf8e5e7ceaf6ca6b9e305d10004bbef394fac8081e193b53b18396a56a58
b8810770055a7b4ffeb1fead4f29b82e9d6914feb2d320aa3056e568dc7fc898
3155ff7ac3d290b13e8285c7601a61eee1f77740f353f4e18e71bed0ff1271e5
19fd7a55e2d05dc81f96d595fce999549ebbdab42c6a021727b11b2bd30821fd
6e1c4a1708e8e2ee40e95fb5fde40aed9ede85f5c04021b4b293ae44ef976dac
4205803590cac6cc76d07e6a204426d6f04ab9353091e41bbb5a2007de7be11a
eef84d42184575c24a2e82b38904ca930bd701ad4d9035323f40d6406aeda0d8
2fff9ea3a4fc0cbe35b454161c92d2a98bc09f977e3cf427ef70ca8e96244e6a
9863c9724a3126f10a0aa224035f2021cf4c6eced322e8a67764b707cc467613
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.