MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9368cfd93da7beb18c6e3bba2c906e1c228b79adb1d20193086ea11f22184fd7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | 9368cfd93da7beb18c6e3bba2c906e1c228b79adb1d20193086ea11f22184fd7 |
|---|---|
| SHA3-384 hash: | 95b00b178a3c3e495a1bd54b23ee461369ae8686fe4048cf1cd693d2c6a7abf435637dadcd01954daabdc1b34ba81838 |
| SHA1 hash: | 928d71344570dbfa77361670d50054a90b00d24f |
| MD5 hash: | 9e61aa0ed60364a305a35081d1b159da |
| humanhash: | leopard-pasta-mirror-lion |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'088'000 bytes |
| First seen: | 2023-10-17 21:27:12 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:IyABH9SNAMlUzcF33MKlfChDCpa9LfdQK13XeweH:PAA43+Ppa9HdXe5 |
| TLSH | T13F352366E7D8A132DD65277408BA17E30F36FDA14C71D6AB3B51B9061CA3784A23133B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://77.91.68.29/fks/
85.209.176.128:80
185.216.70.238:37515
https://pastebin.com/raw/8baCJyMF
http://77.91.124.1/theme/index.php
http://5.42.65.80/8bmeVwqx/index.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.