MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ab4e09d828cfe24f1be095a0f811b30ef73636bcd5df389963c340a9297ba5f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | ab4e09d828cfe24f1be095a0f811b30ef73636bcd5df389963c340a9297ba5f0 |
|---|---|
| SHA3-384 hash: | 314a35613a28ce79ce22d1aa8a4af8ecc30bc92f5b738851d70912613a3f85581ad24fb73a1d35dfc1e4a4b3e07e179c |
| SHA1 hash: | d9ec72e5995662ee884ad0a2b59fe221f95e9242 |
| MD5 hash: | 2f596631ac1c4a778b2e11e4313ab35d |
| humanhash: | low-nevada-timing-foxtrot |
| File name: | 2f596631ac1c4a778b2e11e4313ab35d.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'456'128 bytes |
| First seen: | 2023-11-11 18:10:51 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:gyi5sacwJymgVZxL9JfFeVIsn2kGXe5Dp60+A/RsYY7W+2JnWorGc:ni5NcwEmkZN/9eWEhG+d6dA/mx7J2JnZ |
| Threatray | 286 similar samples on MalwareBazaar |
| TLSH | T1346523177EC880B1F4F2137258FB0B4B17267D159D38622B2549A49BBDB2AC13931B7B |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
5.42.92.51:19057
Unpacked files
ab4e09d828cfe24f1be095a0f811b30ef73636bcd5df389963c340a9297ba5f0
4f90ae190b1e47476a45ab214017e87867be6d821e8051329da38a0800620462
0e6dbb451f85e0c7ead1cf375691503963da6fb35f902e6dd2a8d0bbd825ad9e
fd2023e4dfcb089a237eb10a82aacdd092b8c8337b1bdd2f2a3942a5c12cbf8d
ac7c5843a1ed152a67e3c5dbbf856c93474b8711ffbaa6c232e9524f45187750
8e2b1213dc5d4895355bfb61be049d454f5b06fad8807f9744a719492796415c
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
| Rule name: | win_redline_wextract_hunting_oct_2023 |
|---|---|
| Author: | Matthew @ Embee_Research |
| Description: | Detects wextract archives related to redline/amadey |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.