MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 663cec85c5c8ab0521b4ee97535d861c18e452a86dc394140af295285efad4b2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | 663cec85c5c8ab0521b4ee97535d861c18e452a86dc394140af295285efad4b2 |
|---|---|
| SHA3-384 hash: | 03698f4a92e1aa7ce2cd87bba6fce0f0fab5dcf9c7810e56c53f98186c8545d6387b373128ebc405ab850415a3b8f737 |
| SHA1 hash: | 3b409d1bec6f12ccaf5d1205e56d60e873f8e227 |
| MD5 hash: | 17c8f5079d00963c47dfc1944bd023e3 |
| humanhash: | mockingbird-leopard-cola-may |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'586'688 bytes |
| First seen: | 2023-10-23 15:12:07 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:pArYRmBCMbHfTwdGCryELRfmJMZbgsgaS2n:OcRmBnbHbw4CNLR+JMZbRJ |
| Threatray | 2'641 similar samples on MalwareBazaar |
| TLSH | T183752322F7D451A2E8B453B128FB13934B353D634D6482172E9AD91A0EF2BDC6471B2F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.86:19084
http://77.91.124.1/theme/index.php
https://pastebin.com/raw/8baCJyMF
http://host-file-host6.com/
http://host-host-file8.com/
185.216.70.238:37515
89.23.100.93:4449
Unpacked files
126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59
8f231e1ecb926bcf798ec71235260e119e23046e1bb041bc597b8ff2f9ac7b86
b95f9c74d005d952597370d43ee2b1305ac8395be659b03e47b5ef08030a0763
78075b4f4be5aef18593b0fe52478c1bb3e561b0322909b3ba2fb0d4ac866be7
79a182aeec51b93ab6de3bc1a784799ad7ac9622aac54fee587024865bfe6d1b
9da56a411ef414d31af776816e20f022a005a3df31d49095b3824021c7693122
0b475c953c756fdc8cc9093a4e97aa3e11615c20f081fe1efa6d702f7c91a0fc
48a3fbcc0f4c9649eeb3e94e532de3b50f11e0221a4e1089758ae2cca1348ffa
5166ceab3f686fb1b3ea8291429cc9b86fb42041108c08ab2237d7fd3877fe19
663cec85c5c8ab0521b4ee97535d861c18e452a86dc394140af295285efad4b2
3b65813f3d3735aafe026cf0a2993db4e1da3dce321a638c56350fbffdc0c0e9
78f29e74d0868d5d384f76833798f1cedd5e12fe2e6a15d955cf3fbce99d8997
3dddb80ed9de80b4d7c31ecd952500294af3f235a6a0c52a5adfcb35a07a8a7a
698cdcd9df10c92d9da87a9129cb67026995e5e3150216f35b712807ae4f5817
e99ca734f760f8b2b1483bc7970b3766ac11d72a340480bbf1af3b4e07f7ad48
e39701f5394430cbe23d118f6ddb57aacb2bab26a59546271dfcf19a96bfcf8b
df95ada3bd31ef0ca06d6ccd268784ed2433383cc65faab01e7f48c9a8cd1643
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MD5_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for MD5 constants |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | RIPEMD160_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for RIPEMD-160 constants |
| Rule name: | SHA1_Constants |
|---|---|
| Author: | phoul (@phoul) |
| Description: | Look for SHA1 constants |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | UPX20030XMarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXV200V290MarkusOberhumerLaszloMolnarJohnReiser |
|---|---|
| Author: | malware-lu |
| Rule name: | UPXv20MarkusLaszloReiser |
|---|---|
| Author: | malware-lu |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.