MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 98aceb71c23824c45671abfa7c1379cf69c7bda30c050af7abb9de7fbaca7d8a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | 98aceb71c23824c45671abfa7c1379cf69c7bda30c050af7abb9de7fbaca7d8a |
|---|---|
| SHA3-384 hash: | 5b24ef09f538c854be76f8ba659a76fd26c2e718c0d1c7ab3662e1ca24d3126263a8a0b20c53200ae68ce9589cba80f6 |
| SHA1 hash: | 712bd5f848c9995dca6074b1cefd8147b3efa056 |
| MD5 hash: | b6db32fa07281966c5dac21e8d853645 |
| humanhash: | purple-pip-fillet-don |
| File name: | 98aceb71c23824c45671abfa7c1379cf69c7bda30c050.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'214'976 bytes |
| First seen: | 2023-07-16 07:47:03 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:1yqNYlyTdlkQSNxkBl1Oe+VEyI54Mzz1y2l3VRdfvbC:QJaUZNxsB+WB54MzJT1nb |
| TLSH | T1104523823BE84073E9E11BB440F313930A34FD5099B9C76B674AE91B0972BD4A93576F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
0efa83c5d1ab8b46b7b7eceda639e4cba7e329bc396c84fb06e77f0aa5406d2d
855fd4cf224283ecfadcbbde8f8bda52096a389946f6890fa83b09e26cea10dc
afe9e4d04adf967df5df5cf0970f919a3d18ff55bfefe96041374c2c4355e5da
d1aac6394c5b217b0b8fe52c8e37981b92068a602b47ce8e166dfb9acb0013da
a964133c4d4639327e3c453a286874b9441c19712cd3991ff1f182648e45d583
98aceb71c23824c45671abfa7c1379cf69c7bda30c050af7abb9de7fbaca7d8a
34ee11e6751fecbb3859fcc71a1e0d5fc2515d9af8b5b644682ab4fe88f5969c
a964133c4d4639327e3c453a286874b9441c19712cd3991ff1f182648e45d583
0938a999b8caf4ac0b0ae0df1eb9b0b22dec4dfbfa3b4cb4ac6b6fdd35c3f7a3
6bd55afbdee9bee40494e1ad8d221009af60fed046a9028662aea7d0d54f2d65
98aceb71c23824c45671abfa7c1379cf69c7bda30c050af7abb9de7fbaca7d8a
fc9f7583e360dc95e7f18587ed3af2dd6075c48165f776834bee2eba329ef3ed
2e0a9b6a39ce81b93beb155ac3c237f4a6b9248d6b872ed22bfdf8851796b19b
5de64d5ab56bad52329947e26f8110fed2348f921e93665a3999fc44153d6ef8
32cc60651dec2800f90bb8b2edcc69b23693b48683cc9c3e4003d8781219c264
0938a999b8caf4ac0b0ae0df1eb9b0b22dec4dfbfa3b4cb4ac6b6fdd35c3f7a3
6bd55afbdee9bee40494e1ad8d221009af60fed046a9028662aea7d0d54f2d65
21feb39957e192116f1449fe8d8fdf2104aaaef3e4f6a5e516adc72ef63dbd32
98aceb71c23824c45671abfa7c1379cf69c7bda30c050af7abb9de7fbaca7d8a
fc9f7583e360dc95e7f18587ed3af2dd6075c48165f776834bee2eba329ef3ed
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.