MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 65c31f383237c76c4a474bf71d555162360ea071f4738d5a24153d79789ed2e8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 12
| SHA256 hash: | 65c31f383237c76c4a474bf71d555162360ea071f4738d5a24153d79789ed2e8 |
|---|---|
| SHA3-384 hash: | 87c35bc8ca1703b11fb4e4a9fb5defd2ee8de9a45b68732c3deff0c73bfc35b60eee8f0e5df0090d53ebef93efc12f7d |
| SHA1 hash: | 00ce5b796402d2b3d273d467e05d96080952643a |
| MD5 hash: | 986a3897c6093cd758e5fc80e5f46a02 |
| humanhash: | dakota-skylark-river-oven |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 393'672 bytes |
| First seen: | 2023-10-01 18:20:50 UTC |
| Last seen: | 2023-10-03 13:07:56 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 99b61dfa9e1cf5ee0cff9560ceb6d5d3 (4 x RedLineStealer) |
| ssdeep | 6144:lB8LT20nyVbUk/qUVNUt8IU1Xa8ZTyRMy3FB+kBsjnjKDTRXW:ls5nyVbUkBUthmlTShCnjYTRXW |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | T1D9845B727490C663D4D292B0186C763791B4BFB0AC24952FFBCD4746FA8E0CE96D948E |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
andretavare5
Sample downloaded from https://vk.com/doc52355237_666425740?hash=ILKvsimPp2kG02RGOkKoB9EbjfOSOVkkMeLLc0Am3sk&dl=GorcfGe5HuGE9yOoE3AAuCx3XQchhX3gTCrHFgzqtlD&api=1&no_preview=1#1Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
cd48701fd8668bd73175d01d1efe064428d693a22c4ed57ba9369880d7520808
831e1887de32640a9d66dc993eba2c31a7e01f017f69051cc8b94e76fd4bf51d
069eebbc0d62641b23088b3c6561ff8367716f814195ecab325c59ae4e3a0586
da920bb04ee50d8842f01eda3e8eafde082331df010631fc8d0a2c20af911e98
c2e862c769e4797864d4c6052d8434425584d07d964860c6aff1b8e3db898045
7a8d187ccbd2d788afa0ea16c9727b8f83fa61723c538f7f17db6fa8fc099ed2
4eade1e39209d8c167fa296041c18d27c506ec8be766b8357fa418edd852b594
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | BitcoinAddress |
|---|---|
| Author: | Didier Stevens (@DidierStevens) |
| Description: | Contains a valid Bitcoin address |
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Sectigo_Code_Signed |
|---|---|
| Description: | Detects code signed by the Sectigo RSA Code Signing CA |
| Reference: | https://bazaar.abuse.ch/export/csv/cscb/ |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.