MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c1bb10d3a9df957fa6cdf19a29b1613d8fa935a2eab058c08d8338d7804edc42. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | c1bb10d3a9df957fa6cdf19a29b1613d8fa935a2eab058c08d8338d7804edc42 |
|---|---|
| SHA3-384 hash: | 7042fb1090b44bcaa78872b9cd124a8856412c7c13a0b1759fbb38ef3177dc4ad1db8b4b87f7d345822097d5074e6a3b |
| SHA1 hash: | 5a3f1bedea4a77842a871d3edb4beadb3d428c06 |
| MD5 hash: | ba588508b8550cb5f884aa76627bac42 |
| humanhash: | charlie-shade-kitten-pluto |
| File name: | ba588508b8550cb5f884aa76627bac42.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 934'400 bytes |
| First seen: | 2023-09-27 20:41:12 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:eyO5qeGgpGAd1Arz6EAueEw2jlty0jLWSwB5SL:tO5RwbAu3ttBLa5S |
| Threatray | 1'470 similar samples on MalwareBazaar |
| TLSH | T1FB152246A3D88476C66517B158FB0793463D7CE29DFC874E3A966E4A0C736C0E53233A |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
8f265c5bfded531d4eea6bf06ac91799c4fad6f3d3b2e8acb581ecc3b5374ee1
7decb7675605f65b6adafa81ace426cffa10321bd4821225215a4ba499dce669
2cea6607c515b7a8f20ad4bbea4c468b3bd56052c5acf3702098baae1ef1e389
a10b007a3122dffe002916c74c30b90dc3e0666de5b407dda1ea0501c702c4bb
6daf0e0c1c886e8d74c191fb5ca72fcd3810a8c5f491714874ab7d4ae55bf0a7
c22208d387fe333cd5495e05db97d4443c0cfed017fdf79014dd5243ee5486ea
dfeec8cd8923f9661dbde9ee06d51b165c52f618430bbf88660112fb56cfa447
6b4520b7b228d550021c6ce04b490397044f4cc15c23ba68a8644b7587b2aa63
40b3ce6e93b58c5926e40ebcb1d224cbd6c073f8d2281ca89c6cc14a31573d0c
f0efdb440af65c3ccc31797a2725ec5762ca1dd7918c77211cf23f88b70513eb
dfc7864fe3bce36c7f6156067dec952f19d32a54f44c44cfc39b1e966a9d435c
c1bb10d3a9df957fa6cdf19a29b1613d8fa935a2eab058c08d8338d7804edc42
618730502ee3f5a638f10561fc9b4f79ccba0c16cad02b592d399b021124556c
3754061b2cd5f66e9b850cb2a66c528e50131b860297c80a8cf6a0d011fb71bf
4eec43aed0932fe675eccb3de762c1a4b6c434026f8b30db8bdb3a25c2ee2673
20eb220b90ad5a9f6bdeb480b6d5794271b91e111de584cd6dd31f2ed7c9acfc
842953eb4fbc3a0641f54d6a0b798eb4f57f6fcf7dbfa3f16fa0ba01930185a3
3b23158aacd7693ba0ede5cf281c0c06551607ae1d6d4b8214b0e65d395c7003
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.