MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 3a071af8776381962c5745510d8311f352d887bd255d0632a2d75260cf35db75. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | 3a071af8776381962c5745510d8311f352d887bd255d0632a2d75260cf35db75 |
|---|---|
| SHA3-384 hash: | cced7b6ac935202e3901a6b5f2b4f2831aa7b9d4a8a618f27d1f44a8761219441976cdadba00d38b85bcd9c0f7377aba |
| SHA1 hash: | f43a521cd6018bfbd16992c3aa546fec00942110 |
| MD5 hash: | 594dd31f747dc1484fe9587a2fa39204 |
| humanhash: | tennis-alaska-yankee-beer |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'617'408 bytes |
| First seen: | 2023-10-31 05:14:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:531I66F9PZxgapAVwwn86JDj+uy6tvOrL2EmrAxy:86ofXaXBsUrG |
| Threatray | 2'458 similar samples on MalwareBazaar |
| TLSH | T113752307F6C464F2E538677048FB02432E76BE42D924979A23DAB9164CB16CCAD317B7 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.86:19084
http://77.91.124.1/theme/index.php
194.169.175.235:42691
194.49.94.11:80
http://host-file-host6.com/
http://host-host-file8.com/
http://195.123.218.98:80
http://31.192.23
Unpacked files
d5dcc0a653d340128cbea8b7bd1db80b45c1c9a900808c2098010b0bc794af6b
ff1dffb89fbb43e42796b56bca4bfe0878568bcbb62f0503b583aea2c3218e2c
e9790866431d4da840b8c73251d727d3694a8be070caf5a0563d604014275701
696a4cdac022af544d50350572f5349368c2574b3b9734f98134752820b7e8e6
4cb429f2d4df1601088f0751401d5653b16942c84455340729337b003da5a71a
b10276028f913fa2bdcddea46213402e0181c54b33ff4b0df693da8cca6687dc
d65edb8c4660f998ce9a8c7788f7953f4ee59612c8a40e9f590aa0397708f93e
e8473fef65d17c9da9924866ac42f487e57da30e95381b56d3e75471d2ee62ca
3a071af8776381962c5745510d8311f352d887bd255d0632a2d75260cf35db75
d10e1ac749cf2185f3c055253d44dbe8011ef7152c8fcc058b1552d86b9f77c6
a9a91392e29001f32f3467038f4492f0035f5a12db02357e8254a619356afbe5
d79c382288abd0cdde7623c47e8619edd985be7ff6bf4c68a8a736126d58f2ef
908937757044acafb715c83e8fbb3d20c294475ba129cd1c67e1bcc426be2489
9775f61b217fba6ed58995a4a88bb17eb3b76bfdedb6681c04ea4173f0bc50f9
4280e6e70fceb92c11d7de42e14854783d09a551769b9117097cd4a5affe3b35
3a071af8776381962c5745510d8311f352d887bd255d0632a2d75260cf35db75
3982986ebc039ab0e704c819d657c2d1014109b45aa86f058c81ff04771dcb50
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | Check_Debugger |
|---|
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | QbotStuff |
|---|---|
| Author: | anonymous |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | SUSP_OneNote |
|---|---|
| Author: | spatronn |
| Description: | Hard-Detect One |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.