MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 7088eef531e434fd942b970720391bbe904ae8788ec4b7bda0d770871cc4bbae. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | 7088eef531e434fd942b970720391bbe904ae8788ec4b7bda0d770871cc4bbae |
|---|---|
| SHA3-384 hash: | 13c09acadc0e82c20a42dcf028edaa667efac310f43d3ad3a460f057b01c6ef23d8af7a27a9004356c175b4c491693d2 |
| SHA1 hash: | 2f7361834e42ee9651aebae441b93d6f807caef3 |
| MD5 hash: | 3e8c38177d83af058d28a88a2650ac06 |
| humanhash: | zulu-moon-artist-fourteen |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 326'656 bytes |
| First seen: | 2023-07-01 18:20:30 UTC |
| Last seen: | 2023-07-01 18:54:06 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 600dde5c5111199176fb79ad673bec43 (3 x RedLineStealer, 1 x CoinMiner, 1 x TeamBot) |
| ssdeep | 6144:5Uu0yirCtrXtkNPE6gi19v734Q96rgPTV:zNXtkJdgi19bb8I |
| Threatray | 123 similar samples on MalwareBazaar |
| TLSH | T1C9648E4353A1FD65E9258B738E1FC6E8768DF2608E497B6AB2188E6F0871172D1F3710 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 0004040a820c5a01 (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
a73751b3b80c672e30ee18e7055158e088498c4f991035c1af8f93d74f410738
2ac4ab09870a44e38487c36c5499e4d62ad8fe38f953084785b6228e794a583d
f1e100b82de1f8abb1a8de5c15b033e2e8780ed052b545d7a6872ee307478833
1296a916fa8713ad1998be1e2f7547e501746e63b0c894e5401c6ad5081ba833
b44a9d8b72094c61d136f8859fbe0dafa8800a1ecf81d1859b0c48e2059b1060
2b4cde43e756dbb5337d00fb45dabfd9edcd5c83cd593b7f9f365320fba09727
730e14d5a5be5ed404a72d44799910d2295f98f5f02f623f56ff7594f3c49aff
a73751b3b80c672e30ee18e7055158e088498c4f991035c1af8f93d74f410738
2ac4ab09870a44e38487c36c5499e4d62ad8fe38f953084785b6228e794a583d
f1e100b82de1f8abb1a8de5c15b033e2e8780ed052b545d7a6872ee307478833
1296a916fa8713ad1998be1e2f7547e501746e63b0c894e5401c6ad5081ba833
b44a9d8b72094c61d136f8859fbe0dafa8800a1ecf81d1859b0c48e2059b1060
2b4cde43e756dbb5337d00fb45dabfd9edcd5c83cd593b7f9f365320fba09727
730e14d5a5be5ed404a72d44799910d2295f98f5f02f623f56ff7594f3c49aff
a73751b3b80c672e30ee18e7055158e088498c4f991035c1af8f93d74f410738
2ac4ab09870a44e38487c36c5499e4d62ad8fe38f953084785b6228e794a583d
f1e100b82de1f8abb1a8de5c15b033e2e8780ed052b545d7a6872ee307478833
1296a916fa8713ad1998be1e2f7547e501746e63b0c894e5401c6ad5081ba833
b44a9d8b72094c61d136f8859fbe0dafa8800a1ecf81d1859b0c48e2059b1060
2b4cde43e756dbb5337d00fb45dabfd9edcd5c83cd593b7f9f365320fba09727
730e14d5a5be5ed404a72d44799910d2295f98f5f02f623f56ff7594f3c49aff
a73751b3b80c672e30ee18e7055158e088498c4f991035c1af8f93d74f410738
2ac4ab09870a44e38487c36c5499e4d62ad8fe38f953084785b6228e794a583d
f1e100b82de1f8abb1a8de5c15b033e2e8780ed052b545d7a6872ee307478833
1296a916fa8713ad1998be1e2f7547e501746e63b0c894e5401c6ad5081ba833
b44a9d8b72094c61d136f8859fbe0dafa8800a1ecf81d1859b0c48e2059b1060
2b4cde43e756dbb5337d00fb45dabfd9edcd5c83cd593b7f9f365320fba09727
730e14d5a5be5ed404a72d44799910d2295f98f5f02f623f56ff7594f3c49aff
a73751b3b80c672e30ee18e7055158e088498c4f991035c1af8f93d74f410738
2ac4ab09870a44e38487c36c5499e4d62ad8fe38f953084785b6228e794a583d
f1e100b82de1f8abb1a8de5c15b033e2e8780ed052b545d7a6872ee307478833
1296a916fa8713ad1998be1e2f7547e501746e63b0c894e5401c6ad5081ba833
b44a9d8b72094c61d136f8859fbe0dafa8800a1ecf81d1859b0c48e2059b1060
2b4cde43e756dbb5337d00fb45dabfd9edcd5c83cd593b7f9f365320fba09727
730e14d5a5be5ed404a72d44799910d2295f98f5f02f623f56ff7594f3c49aff
a73751b3b80c672e30ee18e7055158e088498c4f991035c1af8f93d74f410738
2ac4ab09870a44e38487c36c5499e4d62ad8fe38f953084785b6228e794a583d
f1e100b82de1f8abb1a8de5c15b033e2e8780ed052b545d7a6872ee307478833
1296a916fa8713ad1998be1e2f7547e501746e63b0c894e5401c6ad5081ba833
b44a9d8b72094c61d136f8859fbe0dafa8800a1ecf81d1859b0c48e2059b1060
2b4cde43e756dbb5337d00fb45dabfd9edcd5c83cd593b7f9f365320fba09727
730e14d5a5be5ed404a72d44799910d2295f98f5f02f623f56ff7594f3c49aff
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | MAL_Malware_Imphash_Mar23_1 |
|---|---|
| Author: | Arnim Rupp |
| Description: | Detects malware by known bad imphash or rich_pe_header_hash |
| Reference: | https://yaraify.abuse.ch/statistics/ |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.