MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 698cdcd9df10c92d9da87a9129cb67026995e5e3150216f35b712807ae4f5817. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 698cdcd9df10c92d9da87a9129cb67026995e5e3150216f35b712807ae4f5817 |
|---|---|
| SHA3-384 hash: | 686d39d5e3efc2418531182278a0baa394a3aaebe711519df47d019777c64d236c0f366bd1eea2e50775c5464d0d33e9 |
| SHA1 hash: | dcb107565f338ea039db9e1b596fedbba9280d90 |
| MD5 hash: | b90afe4f262dd747368504f840dab838 |
| humanhash: | snake-happy-arizona-papa |
| File name: | b90afe4f262dd747368504f840dab838.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'585'664 bytes |
| First seen: | 2023-10-23 16:55:20 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:TJ9NDchxQG8R7yZiCoq0CWbqADFRl3eMQ:V9S77nokWb9 |
| Threatray | 2'445 similar samples on MalwareBazaar |
| TLSH | T12A752322FCC550BBE8BD2BB055F2138319313C626E649B135695882B1EB3AADD47077F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://yvzgz.cyou/index.php
https://yvzgz.cyou/index.php
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
185.216.70.238:37515
89.23.100.93:4449
Unpacked files
126c0f9959aa4a01bb5e8254b72b4bac370a12cddded7d815ea09b0894f1ee59
8f231e1ecb926bcf798ec71235260e119e23046e1bb041bc597b8ff2f9ac7b86
b95f9c74d005d952597370d43ee2b1305ac8395be659b03e47b5ef08030a0763
78075b4f4be5aef18593b0fe52478c1bb3e561b0322909b3ba2fb0d4ac866be7
79a182aeec51b93ab6de3bc1a784799ad7ac9622aac54fee587024865bfe6d1b
9da56a411ef414d31af776816e20f022a005a3df31d49095b3824021c7693122
0b475c953c756fdc8cc9093a4e97aa3e11615c20f081fe1efa6d702f7c91a0fc
48a3fbcc0f4c9649eeb3e94e532de3b50f11e0221a4e1089758ae2cca1348ffa
5166ceab3f686fb1b3ea8291429cc9b86fb42041108c08ab2237d7fd3877fe19
663cec85c5c8ab0521b4ee97535d861c18e452a86dc394140af295285efad4b2
3b65813f3d3735aafe026cf0a2993db4e1da3dce321a638c56350fbffdc0c0e9
78f29e74d0868d5d384f76833798f1cedd5e12fe2e6a15d955cf3fbce99d8997
3dddb80ed9de80b4d7c31ecd952500294af3f235a6a0c52a5adfcb35a07a8a7a
698cdcd9df10c92d9da87a9129cb67026995e5e3150216f35b712807ae4f5817
e99ca734f760f8b2b1483bc7970b3766ac11d72a340480bbf1af3b4e07f7ad48
e39701f5394430cbe23d118f6ddb57aacb2bab26a59546271dfcf19a96bfcf8b
df95ada3bd31ef0ca06d6ccd268784ed2433383cc65faab01e7f48c9a8cd1643
698cdcd9df10c92d9da87a9129cb67026995e5e3150216f35b712807ae4f5817
8a050fc64eb70e4b9e3e73c3da3fcaad6e7ff5a8b262a924d7a2a82ea42c9bbf
a3e337e452eb2928cb9caa92c95074102edda3634702f82550a3b8fcd7edbd79
1e02fa86911227ea0f6782b70c66feb3627e94c2af3333513d5c3f8579598454
8e33e5843c6f134c163ff661b83436356ee89aff55724960bfcd7c6a7529483b
bfc48dedf2207e64f7b5e694256dc83acbbe92c5ee27f702d28e42fc681ea2f0
4ac1b68bf6a788581502da65076b476919ff75a9d943231ec964c74f052043b2
38b0b5284a9b98e4a973bc7a21e0ca58b2ca348b156f2175f63131ba4f15bdda
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | mal_healer |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | Payload disabling Windows AV |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.