MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 57635a3e961e37e2193a038c9e90dd73b6841c1b316f8d128137a80fba61495c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | 57635a3e961e37e2193a038c9e90dd73b6841c1b316f8d128137a80fba61495c |
|---|---|
| SHA3-384 hash: | 6cd2ba2dc6e8af91b179ba1e2d396fa9160b0e6ff0f9dbfc0983850c57977599d2cf11dc06e06ca3078c1c813af3ddc8 |
| SHA1 hash: | 823e058a5177cac83e588e08a800aac1616da77c |
| MD5 hash: | 429d5e5fae4d539d6c9407a9f9183dd5 |
| humanhash: | august-aspen-white-three |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'633'792 bytes |
| First seen: | 2023-10-27 10:45:43 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:LX4fPn3XKiA8uYNWHH0mri26YwVbFd1ydo:4nZNWHfG26PVbTQdo |
| TLSH | T1DB7523C3EAD94073D9F127B118F30103163BFCA18D55CF8E1789DA6A59E2A44B578B2B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
http://195.123.218.98:80
http://31.192.23
194.169.175.235:42691
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.