MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 80ada740ebfd0573ea8825fc2b499a0d326897ebf254fc015852802a58a05452. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | 80ada740ebfd0573ea8825fc2b499a0d326897ebf254fc015852802a58a05452 |
|---|---|
| SHA3-384 hash: | 592d9fe34aa7ffb02b45d8c573a8cac6b87b34f1499602e49eaa3116cbfd0a2153e17653536a77a34c3629fed375a4cf |
| SHA1 hash: | 13173b00db1bff7e45c00be7327ae24bbb6e2ca6 |
| MD5 hash: | 774a173c2d0a5266b73ba5527e606bbe |
| humanhash: | oxygen-foxtrot-louisiana-hot |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'052'672 bytes |
| First seen: | 2023-07-14 12:22:13 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 12288:dMrly90aVXB6zrLW/kRNgMwsBpdTgep1Ez7O92GtV4zCpGr1DUzAWXZnQ2P++3qG:kylXB6XOALgepYO4GcFrQXZnBP+uqSh |
| Threatray | 1'277 similar samples on MalwareBazaar |
| TLSH | T197252303EAEC8167DAB523B414F603E30B227E61DDB8535B5655896B1C32BC4AC3672F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.