MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 6e627ca700a4794c9e46a849daed709312bacf1587109607e2f6c5eebb8a2598. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | 6e627ca700a4794c9e46a849daed709312bacf1587109607e2f6c5eebb8a2598 |
|---|---|
| SHA3-384 hash: | 091686475c767b912cc71505043977be58a16562910b3f07f3fad6644e293ed77c320f46e85d4e65f4dbc08a184e6b2e |
| SHA1 hash: | bcb056d3a80a4c855969b3e49dcad305a0e863cb |
| MD5 hash: | ffeaec655843a2e8f6a156144fd8b684 |
| humanhash: | fish-victor-lactose-princess |
| File name: | ffeaec655843a2e8f6a156144fd8b684 |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 424'960 bytes |
| First seen: | 2023-11-14 09:19:51 UTC |
| Last seen: | 2023-11-14 11:24:13 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 1c7d0efed001e965dd9c0307904ea44a (6 x RedLineStealer, 1 x RaccoonStealer) |
| ssdeep | 6144:AvilPFF2W+kUanD48AOjGHFI9m3ziGixMjlgJht/lliLZ1awmBegYZT3MJ3NiVQb:hlNF2xv80lI92ofivJ7v/B2D |
| Threatray | 23 similar samples on MalwareBazaar |
| TLSH | T178946BC670D9C0BAC412183985D4C9782CBD94533B8707B7D2EC8D4B1FB27A2AA7B6D5 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | 32 exe RedLineStealer |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.url : hxxp://5.42.92.52/66844/done.exe