MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c5e390a99b5e24664a62ee6f36778d439bdfebb7729d7862a63b61e344babceb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | c5e390a99b5e24664a62ee6f36778d439bdfebb7729d7862a63b61e344babceb |
|---|---|
| SHA3-384 hash: | d613645471f2a7e8158a819f86bf65b91a38977eeee4526eadc6672ae3a3829e0b2906eb3139a18aed2f0c94377d3bc9 |
| SHA1 hash: | 5b9967c5b59d7864a4d3a6f9295d2f3825f83bb1 |
| MD5 hash: | 1e8b3ee679fa2d2d3cf7121c2c7b8125 |
| humanhash: | neptune-chicken-victor-queen |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 407'040 bytes |
| First seen: | 2023-09-19 12:16:29 UTC |
| Last seen: | 2023-09-20 13:34:02 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 07369f734c0325aae69a2991bce41551 (15 x MysticStealer, 4 x RedLineStealer, 1 x CoinMiner) |
| ssdeep | 6144:W/+FjzsPCbww17bmxUa3feAOovf5u8rXZDKii+N0AFQb2CtcrGARLUbzcJ/YyUi:W/+BsPCbwwq2MBu8rXEB+N0kLUKYyUi |
| Threatray | 1'010 similar samples on MalwareBazaar |
| TLSH | T12B84593070B4C8F2FCA272F595A49FE109EAB4241B65945FDBE349FA99D027BD13C602 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
andretavare5
Sample downloaded from https://vk.com/doc52355237_665890294?hash=NcsRczd0BX3TSR3HyPZ30zNGv3C7xzw5vRlKMYfBeN4&dl=Yc8W8VccZvuz3BRBdiVlrwcfp3IUflN33aQXcjJgjb8&api=1&no_preview=1#1Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.