MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 4f90d97f3ef33851bba630cb781820f861144c97b7b962363ba18ee9bd72a7c2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | 4f90d97f3ef33851bba630cb781820f861144c97b7b962363ba18ee9bd72a7c2 |
|---|---|
| SHA3-384 hash: | c8efe2153d7a87e2b124e7391bcde389e28230b6a6552c3f476e7eec5cf16a1e377b02483a1b05855daac250cefa2c4f |
| SHA1 hash: | 5b8a093dfda47c32086858bc21a7e68096ce7dd3 |
| MD5 hash: | c42c2c9bbdb02392544f277a6de26d7d |
| humanhash: | texas-hot-white-grey |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 468'424 bytes |
| First seen: | 2023-10-07 15:21:57 UTC |
| Last seen: | 2023-10-07 16:30:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 06ede52fcc31e4900f4f1a7060fce645 (10 x RedLineStealer, 6 x Stealc, 5 x Amadey) |
| ssdeep | 6144:j9LT/LkbRalPXkmJavrR25LAOTGaAs1Pu8Y8XCpCoCrItDMpDQ3EC0p:j9LPkNalvB9Gps1Pu8YCrItDMp6Mp |
| Threatray | 261 similar samples on MalwareBazaar |
| TLSH | T10DA44BAEF2D2B425C1350B3917948ABDCEF86D44CBE63597D7A48EA70E305807E34DA1 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Sectigo_Code_Signed |
|---|---|
| Description: | Detects code signed by the Sectigo RSA Code Signing CA |
| Reference: | https://bazaar.abuse.ch/export/csv/cscb/ |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.