MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9d8b27beac75c83b81370d2b26d023e2bfcb4a6b385a477dc84edd548bf490cb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | 9d8b27beac75c83b81370d2b26d023e2bfcb4a6b385a477dc84edd548bf490cb |
|---|---|
| SHA3-384 hash: | 68e3d07200fd7e9fb1b5c73dc68a87aa0e56fcfbadc3454631e12c8c6738ddce741995836bf91d2735636c1ab1b434e8 |
| SHA1 hash: | f4ff2f72ff42b384c974b1974b69e85f68f0da0b |
| MD5 hash: | 8bfe52e5cb5f3e282795bf116633ac35 |
| humanhash: | orange-oregon-august-comet |
| File name: | 8bfe52e5cb5f3e282795bf116633ac35.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 823'296 bytes |
| First seen: | 2023-05-28 19:50:15 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:cySzjCiYPC0LxldTeiuBZbJBEgpY7BB3MOOxA:LSzjCdPWBbBpYjcx |
| Threatray | 310 similar samples on MalwareBazaar |
| TLSH | T1D2051211FED85536CCF21F7058F613830B35BCA399B887AB67449C9A2CB22D4A935736 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.