MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 572ceb288c34f070937cada71821e3f7aae5b3158cba6f1c0f82cb72a0ef0e72. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 14
| SHA256 hash: | 572ceb288c34f070937cada71821e3f7aae5b3158cba6f1c0f82cb72a0ef0e72 |
|---|---|
| SHA3-384 hash: | efb526720390c1074b8fd457b8f585afd08d8436c9131214de7bee1d0545ebe6e657a4cfc3fd953ed70a3dc2c06c9a4c |
| SHA1 hash: | 2e95b9bd3f9c066fea182ea40b6027b54a97ffae |
| MD5 hash: | 5fad06e63586798ffc20a698d3b1d5e7 |
| humanhash: | magnesium-six-paris-april |
| File name: | 5fad06e63586798ffc20a698d3b1d5e7.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 219'136 bytes |
| First seen: | 2022-08-17 06:47:39 UTC |
| Last seen: | 2022-08-17 09:35:41 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | dc9332b959cb98dd78c3622c2d133b3c (14 x RedLineStealer, 6 x RecordBreaker, 2 x Smoke Loader) |
| ssdeep | 6144:k5Cav7YAviw2dlUFs2WW7AO5ijJexqtJ1:kUav7YAvnD7Tiq0J |
| TLSH | T1A3248C1470D1C032E473197209F8DAB9993DB8604BA55DFFA7DC0B6F4F306D1AA31AA6 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
178.32.215.163:17189
Unpacked files
ddbe13c68d469921bd662d5a3cc5b0b490213ca3283bcaa704f6b7a3e98e252a
a7b592b8fc19cd9e9dfdafaf11de3f0f30310bf569c0883494b97257badf5d8b
1d68cf880c17df788d1317cc4b8e6cee909d48f23d77ac42607476d153f76920
b247929c0dacbb6bbf61af984da9386a64139fa70e9ec9c77aeb339e2ae53fb0
751bb44322549c3d231c0ccd57ff518234dbc4e90058ad55832050972581449e
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.