MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 93f8530d34dea0fb896262eee795f0c6f4ab23adfda841baac86558700174560. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 14
| SHA256 hash: | 93f8530d34dea0fb896262eee795f0c6f4ab23adfda841baac86558700174560 |
|---|---|
| SHA3-384 hash: | 3910d4e04d130ac73a4cf4fb2c219702158bc58efec0cf3d4531338ee9c2b57ff9276a9013e36913abdfb4866d7988ee |
| SHA1 hash: | 3ef2e94da8852ee37971e3807ee8c54fbf7b1ec5 |
| MD5 hash: | a64a7baa265befc306047663f7ddddcc |
| humanhash: | mars-cat-magazine-skylark |
| File name: | SecuriteInfo.com.Trojan.Siggen29.2381.17841.24795 |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 4'473'314 bytes |
| First seen: | 2024-07-18 09:25:53 UTC |
| Last seen: | 2024-07-24 19:11:18 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | be41bf7b8cc010b614bd36bbca606973 (195 x LummaStealer, 126 x DanaBot, 63 x Vidar) |
| ssdeep | 49152:EAsKPhPvTOvt6hwpc8nSWG01gKKwb918EzI+n+RcwPIW5+S6SWvONKVwbcst:E6hPvU6KK87XJ1b91LBn+RceYmbc |
| TLSH | T19526AE237681B53AC05B073A5537A671893EBB91BA12CD57A7F0788C9F3168079393CB |
| TrID | 29.2% (.CPL) Windows Control Panel Item (generic) (57583/11/19) 21.1% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9) 15.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 10.9% (.WLX) Total Commander Lister extension (plugin) (21500/1/6) 5.3% (.EXE) Win64 Executable (generic) (10523/12/4) |
| File icon (PE): | |
| dhash icon | 919ccce372d98c84 (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| 94.156.69.115:46958 | https://threatfox.abuse.ch/ioc/1302227/ |
Intelligence
File Origin
FRVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | Borland |
|---|---|
| Author: | malware-lu |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | NSIS_April_2024 |
|---|---|
| Author: | NDA0N |
| Description: | Detects NSIS installers |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
BLint
The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.
Findings
| ID | Title | Severity |
|---|---|---|
| CHECK_AUTHENTICODE | Missing Authenticode | high |
| CHECK_DLL_CHARACTERISTICS | Missing dll Security Characteristics (HIGH_ENTROPY_VA) | high |
Reviews
| ID | Capabilities | Evidence |
|---|---|---|
| COM_BASE_API | Can Download & Execute components | ole32.dll::CoCreateInstance |
| SHELL_API | Manipulates System Shell | SHELL32.dll::ShellExecuteW SHELL32.dll::SHFileOperationW SHELL32.dll::SHGetFileInfoW |
| WIN32_PROCESS_API | Can Create Process and Threads | KERNEL32.dll::CreateProcessW KERNEL32.dll::OpenProcess KERNEL32.dll::CloseHandle KERNEL32.dll::CreateThread |
| WIN_BASE_API | Uses Win Base API | KERNEL32.dll::LoadLibraryW KERNEL32.dll::LoadLibraryA KERNEL32.dll::LoadLibraryExW KERNEL32.dll::GetDiskFreeSpaceW KERNEL32.dll::GetCommandLineW |
| WIN_BASE_IO_API | Can Create Files | KERNEL32.dll::CopyFileW KERNEL32.dll::CreateDirectoryW KERNEL32.dll::CreateFileW KERNEL32.dll::DeleteFileW KERNEL32.dll::MoveFileW KERNEL32.dll::GetWindowsDirectoryW |
| WIN_REG_API | Can Manipulate Windows Registry | ADVAPI32.dll::RegCreateKeyExW ADVAPI32.dll::RegDeleteKeyW ADVAPI32.dll::RegOpenKeyExW ADVAPI32.dll::RegQueryValueExW ADVAPI32.dll::RegSetValueExW |
| WIN_USER_API | Performs GUI Actions | USER32.dll::AppendMenuW USER32.dll::EmptyClipboard USER32.dll::FindWindowExW USER32.dll::OpenClipboard USER32.dll::PeekMessageW USER32.dll::CreateWindowExW |
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.