MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9a5edb6aa69efa46313266ea7a85b79483b2cde51e3eebee4f1ed0a60608fd5e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | 9a5edb6aa69efa46313266ea7a85b79483b2cde51e3eebee4f1ed0a60608fd5e |
|---|---|
| SHA3-384 hash: | 5b36c49d14e115b9cec6b06f03e7175612f51b2ba0c7d240509c18e70539edf94b20bd2e63b713fe19b7ed297eb9e44e |
| SHA1 hash: | 801c830e108e39a7fc11dde6ff137ff236045d87 |
| MD5 hash: | 44fb86005c70f88420c4a827380bcdb6 |
| humanhash: | washington-georgia-eighteen-mike |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 416'104 bytes |
| First seen: | 2023-11-10 09:47:33 UTC |
| Last seen: | 2023-11-10 11:21:03 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 400e014fc7e99c6ed0eda1c5f8c08366 (1 x RedLineStealer) |
| ssdeep | 6144:8Ji3QiVzgGZS2ViMzeXp+R+yyCxY5Mnau59h81gCMHakKw:86ZrcnKeX4RfM5MX59GQakKw |
| TLSH | T199945B291C77F15FC0CDAD747380A58A4FE5476B0A08CF5CD6EB023A259F5412DBA2AE |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files
3d579bcd2fc80a2fa2cb09a9ac4bcf49b5a9f666e1071ed9d75b0a2d0c840655
2e7e9784fb0ccd858348fa2b13797dcc941dd6b1351153a713ddd07f4232952d
92e7b43cbf0329a17fe32ea019b494a44e8b1766db9c2449c7bbaec7942d393c
58524748828878ee29f44e2a4a4d624a0374c76d8463f885b6c58d8795d318c7
a4f3b478d75618345ccab921fd3979fc8eb4c455129d3f83d7f1ada70e3f8349
9a5edb6aa69efa46313266ea7a85b79483b2cde51e3eebee4f1ed0a60608fd5e
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.