MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4b98270b3e02bf07273bff68629c189086e93fe88a5bb305de19245d6e7ad467. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 4b98270b3e02bf07273bff68629c189086e93fe88a5bb305de19245d6e7ad467 |
|---|---|
| SHA3-384 hash: | 2942577123ef3629071884e8ecbfc56557a1b89b1230a1006e96013a9a3edbe3a595c7ca8ca6ab5d71d708c4ceed4a72 |
| SHA1 hash: | 965df2a2b620c579fd4102e92cd408036dbd5989 |
| MD5 hash: | a9a70db8d9d35498c1f1611476dc9b4a |
| humanhash: | lithium-yellow-three-bluebird |
| File name: | a9a70db8d9d35498c1f1611476dc9b4a.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 778'240 bytes |
| First seen: | 2023-05-27 13:25:30 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 12288:0Mr8y90iWfz1Xx/Ly/3qpqxY3x46f3nvUBqKbBHnx4NQWIYp+4COVnJ66BJ:IybW5pOYhvApBwQWI7iJnBJ |
| Threatray | 3'706 similar samples on MalwareBazaar |
| TLSH | T15EF4231372EC4532D97A7B7118FA0B471B397C666E348BAB3740A55D1C73B84A832B63 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.