MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c6ad39827b1956588b971317709a5a606dfa2e82e9ef690e8a3953a3ae9e104a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | c6ad39827b1956588b971317709a5a606dfa2e82e9ef690e8a3953a3ae9e104a |
|---|---|
| SHA3-384 hash: | 0b4111c52b1c668d72a6d8e642fb62b3680bbb30c965fef4316d552e40d053bdb7d2e0c6fb3634e4f38bed107d3c4eb1 |
| SHA1 hash: | 24353dba6f35e8bf2cc825082aca702fd19e0202 |
| MD5 hash: | 11507a5c51688518bc7646b32560fa60 |
| humanhash: | romeo-six-harry-cold |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 342'800 bytes |
| First seen: | 2023-05-21 14:25:57 UTC |
| Last seen: | 2023-05-21 22:20:07 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | b46b7655f5ed701dbc7075afa681ec5a (5 x RedLineStealer, 1 x Stealc) |
| ssdeep | 6144:gWiBLO/6vaiP0kV1upF7mRjCvo4eM/G7drYD4JqEHkI:iBLO/CP01pM4vmM/G7d13 |
| Threatray | 1 similar samples on MalwareBazaar |
| TLSH | T194748D336A468036FC2B95B846C59AA954EC75701F9F40E7EFF89FDE4E90AD06920207 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
andretavare5
Sample downloaded from https://vk.com/doc797927207_660732842?hash=bS2RbDpmVnZLDiOnkxzhtCuwdNQXSZJNbGudaC0eFPX&dl=pGxNmlpC7skz2Nq1Pz3WFgWsZPfh8kynN8YgfmqZGps&api=1&no_preview=1#L1Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
c1da34a511ca36d6e7dbd4f789c318203417a0dec5c5ac3f9345831c630bc309
1f4333d8c70e9fb5bd2edb39bab4e3c8db27885730922ca84c454d3dbdb63280
a2c39b847ce41938e37d805ec11bfdded2b04747ce9c55eaf49dffaa65bd894a
00c171bd3f449200aff71e2dbad14816652369a6dcaac0674579befb427ce245
c6ad39827b1956588b971317709a5a606dfa2e82e9ef690e8a3953a3ae9e104a
3852b4cb45769223a426f2bddb4403e9a1bfc9b2973eedef43a27ca2eb5f80e2
2be759f5f9ab6bf0b7c13739fdf21341e54937a4df20853009da7e88f4bf569d
c5d44e67248e64a375ec80ffea0e27dcd643e94d5da84a0ec9baeedff5f5fd76
65ca1576d225175fdebfeb9bb381211a4c9943e79d29b75a1d83b98016dc6a62
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.