MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 64b7b38915b104a8fcdf95c66f8a4b5ccd5f21fc4179a61be733e83066274ecd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 64b7b38915b104a8fcdf95c66f8a4b5ccd5f21fc4179a61be733e83066274ecd |
|---|---|
| SHA3-384 hash: | 49b739763e9194f74047ab9ace18ed0e69b95d8d9d145f23960c0c6f0663e955958a948611e59c4f0446331c01f86bb8 |
| SHA1 hash: | 281621da5f76ae879a900d4414ae14edbf687152 |
| MD5 hash: | 8b490226534cee2830d075cf759e6bee |
| humanhash: | triple-mango-skylark-solar |
| File name: | 8b490226534cee2830d075cf759e6bee.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'617'920 bytes |
| First seen: | 2023-10-25 03:25:42 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:c182uWdeRj249mhPz7MXd2MnCth9v3qbQtsd+:G8FWdej249mJYHSh9v6Ut/ |
| TLSH | T13B752397D6D88032DC6637B18CF7138319327C91ADB9D8FA2AA5989B5C73184E73170B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.