MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6cb97e0b5df68aed88d5311bbc0db32da525fdb8b4e9771f4197bbf180d0b7f8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 19
| SHA256 hash: | 6cb97e0b5df68aed88d5311bbc0db32da525fdb8b4e9771f4197bbf180d0b7f8 |
|---|---|
| SHA3-384 hash: | 1d9219cc203912c70861dce949edaf4bae10026933fafad47b7c578585277839bd0a8d25c3ec6cbec21341d9e600e68e |
| SHA1 hash: | 3c5b045035f3a5c1311207ec3d6cfa9a58e5b67f |
| MD5 hash: | ede94ce030138adae8f518b53dd15f9a |
| humanhash: | juliet-hamper-virginia-march |
| File name: | Steam API Cracker Coded by MR.ViPER - v3.0.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'358'336 bytes |
| First seen: | 2024-08-05 18:12:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'752 x AgentTesla, 19'658 x Formbook, 12'248 x SnakeKeylogger) |
| ssdeep | 24576:1WpYXFJAgw/dn/ZY4trYPJ3jj4u0lu7SInx0SHnLqk2j0QjzVxbsuHtyRpz:0eXF+gUJx7sh3H4usu7LdLqk2jTjXsum |
| Threatray | 6 similar samples on MalwareBazaar |
| TLSH | T1F455123A8A4859E5CDD4A0F0C07752DD5307FC6D090F4A71EF86ED1E16E2A5B0BA98BC |
| TrID | 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 10.2% (.EXE) Win64 Executable (generic) (10523/12/4) 6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.3% (.EXE) Win32 Executable (generic) (4504/4/1) 2.0% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | f0a40695918bc29a (3 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
ROVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.