MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 bfb9673aa05a5ffe99bf6dbe80e621e2c6d1883e132a4d6888430b5913a1d69b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | bfb9673aa05a5ffe99bf6dbe80e621e2c6d1883e132a4d6888430b5913a1d69b |
|---|---|
| SHA3-384 hash: | e90398b410d36a77b97b8133a4dd841663cd24d8555b1417960e7a1d0dfd42ef09f475b4795153d7cfc037f89e40a403 |
| SHA1 hash: | 926e75fee8c64cbdc2c20be74eec713f2cdc2fde |
| MD5 hash: | a5526238e78f6e7e9463f06448dd210a |
| humanhash: | ack-friend-rugby-iowa |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 820'224 bytes |
| First seen: | 2023-06-16 08:55:08 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:4yqupAOP4UhyTMY4w6hiZaG64O0F0EZul:/NivUhIMRdhId7k |
| Threatray | 930 similar samples on MalwareBazaar |
| TLSH | T188052263A7D4A072D8F46B304CF713A32A367EA1493493AA1784DD9E2C736D5E532327 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.68.63/doma/net/index.php
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.