MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4a821767c6ce723e6fb4b8d54efd52df6cbd63fc0de47a7b8b39a6ec72b4be69. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 14
| SHA256 hash: | 4a821767c6ce723e6fb4b8d54efd52df6cbd63fc0de47a7b8b39a6ec72b4be69 |
|---|---|
| SHA3-384 hash: | 28e3bad7d55e53301cf68af35d457440fe97316d26e093884cf9848e1f6553da9195c0948a41781c45b4c9860bc3ce24 |
| SHA1 hash: | ebb76e6380059314beed98b10cf0c0c2cb84f543 |
| MD5 hash: | cb612a9c421684b58445e4c99e32f8fe |
| humanhash: | yankee-mexico-oranges-utah |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 337'888 bytes |
| First seen: | 2024-01-18 14:11:13 UTC |
| Last seen: | 2024-01-18 16:10:12 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'742 x AgentTesla, 19'607 x Formbook, 12'242 x SnakeKeylogger) |
| ssdeep | 6144:nEEooKYYUXWHeCNY8HsAJR9z3gVx6Xq0rA1zGo1YkimtMtMZEFnmjIvjSoTugXXo:nKumeCbBJT3ma3k1zGo1YkiM1EFnmjIC |
| TLSH | T152742335EBABD534EC1D05B958F411272BBBA3909C1BE9EA7809066DD9C33572FC2390 |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
andretavare5
Sample downloaded from https://vk.com/doc164097589_672855116?hash=mSh9TuTEpiI3WIyEv6KeBbkDXIWEtahFqibE9DZYqzX&dl=Tz5yGFEi1sdhnb9UZsVx9GZrE6EDwA4ELOzsedOG8yT&api=1&no_preview=1#1Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
ab9f7995b911511781cfb226027d60173f2ab8f6482372f51756fa40d93b2f59
ff135242e85af66cecc8c8b7edada3d4c8abca12461a62465ee376e3ce3512e9
27069136cd35a1979a1fe20a06e551c91e2bce6fd526951a00274de902dbf26a
eeceb6bdd4d32373e4a48a99b38ddd271a52f741c259320352839065d3688f76
29b72ae724bf76285d1d1501c0e386d7638ca19e34047e0fe604db4214652d4b
4a821767c6ce723e6fb4b8d54efd52df6cbd63fc0de47a7b8b39a6ec72b4be69
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.