MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6aefcac9b610a002e37fa3be97de13fdb2dda4b9d1ccda8434cd8994e46d297f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RedLineStealer


Vendor detections: 17


Intelligence 17 IOCs YARA 20 File information Comments

SHA256 hash: 6aefcac9b610a002e37fa3be97de13fdb2dda4b9d1ccda8434cd8994e46d297f
SHA3-384 hash: 62c31ba3aa879d58858715cd53a379340015ad2246756b6a4fe6138653d26dd32d20e09f970d55cf5af42eaf59321563
SHA1 hash: eda028507e3b970f38c51c7834f7c08980c1aead
MD5 hash: 4b9d5c2848e1c6d12e5eb5429de4375a
humanhash: mango-chicken-delaware-eight
File name:6aefcac9b610a002e37fa3be97de13fdb2dda4b9d1ccda8434cd8994e46d297f
Download: download sample
Signature RedLineStealer
File size:889'344 bytes
First seen:2025-09-05 12:19:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'666 x AgentTesla, 19'479 x Formbook, 12'209 x SnakeKeylogger)
ssdeep 12288:ndFdAyxauDh/i3iuI9EKWmUac9TpHS8APo3G5TeXv/WYyHEjImOwZVC74DakqMWc:ndFdAiDh/ExI+KzxoOIvRHZwf9woT
Threatray 48 similar samples on MalwareBazaar
TLSH T169150240B206DC47D96656F04C29DA7013B25D8EA876CB8E5ADA3E3FB4F33472012B97
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10522/11/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Magika pebin
Reporter adrian__luca
Tags:exe RedLineStealer

Intelligence


File Origin
# of uploads :
1
# of downloads :
89
Origin country :
HU HU
Vendor Threat Intelligence
Malware family:
redline
ID:
1
File name:
6aefcac9b610a002e37fa3be97de13fdb2dda4b9d1ccda8434cd8994e46d297f
Verdict:
Malicious activity
Analysis date:
2025-09-05 12:22:08 UTC
Tags:
stealer redline metastealer netreactor auto-sch-xml

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.1%
Tags:
redline virus micro msil
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Сreating synchronization primitives
Creating a process with a hidden window
Creating a file in the %AppData% directory
Enabling the 'hidden' option for recently created files
Adding an access-denied ACE
Creating a file in the %temp% directory
Launching a process
Unauthorized injection to a recently created process
Restart of the analyzed sample
Creating a file
Using the Windows Management Instrumentation requests
Connection attempt to an infection source
Sending a TCP request to an infection source
Adding an exclusion to Microsoft Defender
Enabling autorun by creating a file
Forced shutdown of a browser
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
obfuscated obfuscated packed packed packer_detected
Verdict:
Malicious
File Type:
exe x32
First seen:
2025-08-10T21:05:00Z UTC
Last seen:
2025-08-10T21:05:00Z UTC
Hits:
~100
Malware family:
RedLine Stealer
Verdict:
Malicious
Gathering data
Threat name:
Win32.Spyware.Redline
Status:
Malicious
First seen:
2025-08-10 23:57:31 UTC
File Type:
PE (.Net Exe)
Extracted files:
26
AV detection:
26 of 38 (68.42%)
Threat level:
  2/5
Result
Malware family:
redline
Score:
  10/10
Tags:
family:redline botnet:moneylogger discovery execution infostealer persistence spyware stealer
Behaviour
Scheduled Task/Job: Scheduled Task
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks computer location settings
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
RedLine
RedLine payload
Redline family
Malware Config
C2 Extraction:
198.55.98.194:1912
Unpacked files
SH256 hash:
6aefcac9b610a002e37fa3be97de13fdb2dda4b9d1ccda8434cd8994e46d297f
MD5 hash:
4b9d5c2848e1c6d12e5eb5429de4375a
SHA1 hash:
eda028507e3b970f38c51c7834f7c08980c1aead
SH256 hash:
136a60c9c8c39591bd8dc97f1fb75cead5c9f8ed578ea0fee8a6732254dbd6d5
MD5 hash:
ff838709ab4f29234fdbe779e474fa2a
SHA1 hash:
80f5ae51201c00596589e050cdc445da93403991
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
Parent samples :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 hash:
0558a32d226ff0c0c3b99e3e5adba1fe0b15cb2e0cdabd9586b347cb2db3bdbe
MD5 hash:
43292cc56ffe32de38a242e3d83fa84e
SHA1 hash:
87be7b68b706a23bc52cd9f049d5e559f8ae9b48
Detections:
SUSP_OBF_NET_ConfuserEx_Name_Pattern_Jan24 SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
0b60769a9602b34d4333f34a7762e783bc6b1e8ee65ded08d976ff61d8cc898f
MD5 hash:
09fa4125e6d7ed1db58aa18634a3118e
SHA1 hash:
e4ff3e3d5b1167be710a80a6a6941d273861bd53
Detections:
redline MALWARE_Win_MetaStealer
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_AllMal_Detector
Author:DiegoAnalytics
Description:CrossPlatform All Malwares Detector: Detect PE, ELF, Mach-O, scripts, archives; overlay, obfuscation, encryption, spoofing, hiding, high entropy, network communication
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:detect_Redline_Stealer_V2
Author:Varp0s
Rule name:GenericRedLineLike
Author:Still
Description:Matches RedLine-like stealer; may match its variants.
Rule name:MALWARE_Win_MetaStealer
Author:ditekSHen
Description:Detects MetaStealer infostealer
Rule name:NET
Author:malware-lu
Rule name:NETexecutableMicrosoft
Author:malware-lu
Rule name:pe_imphash
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:redline_stealer_1
Author:Nikolaos 'n0t' Totosis
Description:RedLine Stealer Payload
Rule name:RedLine_Stealer_unpacked_PulseIntel
Author:PulseIntel
Description:Detecting unpacked Redline
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:Windows_Generic_Threat_efdb9e81
Author:Elastic Security
Rule name:Windows_Trojan_Generic_40899c85
Author:Elastic Security
Rule name:Windows_Trojan_RedLineStealer_6dfafd7b
Author:Elastic Security
Rule name:win_redline_stealer_generic
Author:dubfib

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments