MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4c28482c928b00d692e59db79d4117f9ce1ce626bd3f013affeba65c8037c04d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RecordBreaker
Vendor detections: 15
| SHA256 hash: | 4c28482c928b00d692e59db79d4117f9ce1ce626bd3f013affeba65c8037c04d |
|---|---|
| SHA3-384 hash: | acbbdfad82f3d84fa02af57eabd9e76270d5cdd1543f1a57b7d91548ee27e945a6375011a0c2f80eb7376348bfb95fb8 |
| SHA1 hash: | f9f88bbedb8c7ed20758901ec87cb0c1c070ff93 |
| MD5 hash: | 18f1a37bfa3fac48f56fe853113195b6 |
| humanhash: | south-kansas-papa-steak |
| File name: | 18f1a37bfa3fac48f56fe853113195b6.exe |
| Download: | download sample |
| Signature | RecordBreaker |
| File size: | 730'624 bytes |
| First seen: | 2023-11-10 14:21:18 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 12288:rMrsy90f+BwzvvhMpXJj1knSMZUDk4FDxO4OaE8w6yiwd8C80Q/PpVk:ryi+BwrhOXJNl4sDxOVvLn8p9pVk |
| TLSH | T157F41242FFD84462DDA127F018FA13631E367CA25979436B37969D4B1C72A90BA3133A |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe recordbreaker |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
5.42.92.51:19057
194.49.94.11:80
194.169.175.235:42691
http://host-file-host6.com/
http://host-host-file8.com/
http://91.103.252.114:80/
Unpacked files
b717f35fcdab48ca5790c12bf339fea64e08411fe8bb62b6628fbc79bdca73ce
c376a292e63142d3a7d4d0d5264c8a8caf8879c1f43bd69b5b0185f94fd22f02
a7b685b4e30d58a2c8378b2e86dcea7173dca4db782fe3d4ae4ecb07f39cb880
76f52718301f14cc152b8eeb82c1b9018bbe79636a3dfd3df42271eac6e9eaef
c0ba3eb7760d71d85eea95797aa805fa2dd1d2f9df97947a76c84c4e38a74a30
69f71b84eed3929a76f600655f68e0a23433046f3f4597496afe666c01fc4ec5
d9f399cddadbf694ad95f21ee60a3599a8f2d48a7165e1b7f495f60cc7a9ae44
4c28482c928b00d692e59db79d4117f9ce1ce626bd3f013affeba65c8037c04d
5d5d8f8d8ae0d9eca70a68869054127e784f9ce6ad232a68e34f551442ebd0d4
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_redline_wextract_hunting_oct_2023 |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects wextract archives related to redline/amadey |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.