MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 c96153ded15fb3782e6a02dd68aacda1d37b9f66dce2bcc70a69d3545db21b81. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | c96153ded15fb3782e6a02dd68aacda1d37b9f66dce2bcc70a69d3545db21b81 |
|---|---|
| SHA3-384 hash: | ee3ca12b9b4784144537d16da257d876dcf044bae6c879639b9ea814344694937e162f77eee854acb038845ca8372ea3 |
| SHA1 hash: | b64a745494762fce70f160d5c71fe5c06fd84fb9 |
| MD5 hash: | 6f0774089c6cc16d2d0e63eaebe84dd2 |
| humanhash: | hydrogen-double-berlin-monkey |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 358'912 bytes |
| First seen: | 2023-07-23 03:09:27 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | cfbfd8ca3fe61cf1ac99b7bb15f4a1e5 (4 x RedLineStealer) |
| ssdeep | 6144:mlK8gah/S51FzGkXdneOPFur3saHVQEr5Nr3:aK8hRS51oqIO0rRHVQENN |
| Threatray | 168 similar samples on MalwareBazaar |
| TLSH | T15574D02133A0C072F1A755705D74CAA12E7F78A2677851DF3B582A3E6E706C09B743A7 |
| TrID | 52.5% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 17.7% (.EXE) Win64 Executable (generic) (10523/12/4) 8.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.5% (.EXE) Win32 Executable (generic) (4505/5/1) 3.4% (.ICL) Windows Icons Library (generic) (2059/9) |
| File icon (PE): | |
| dhash icon | 14880a24a4e4c000 (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
6704de0ede035873f57ce22930f3d3b0e23ba418723be70870916c330d818c27
5f1c7c05ef502fa4b2bb54351f0ae38a73d25d728e2aa370e739cced90aefb04
84843ae0e91bbacae720437937f1bcea3fcae4d9933d71a07a26a8e81479c0f0
8f39c7257d62b3b16c5418287177b47ba3de6f34937ace8f4b33ce0d5d7b77ab
205b16fb503856c22a47de9919147f75eca374fa0c0b9a63e734483e71bb4a47
88b9fabd26abb085ca896c1f28205fae662d1d201ce50d737d46faed26c8ee0a
d3b95985bbdac941180a93d4e2ce29a9fae660f79b2f740eea472d306cb2a062
57cb2cabaabd38a540ddaa79cbb7b83ceafefff32aca4af2956fd9e78a92e352
b64dac067da9a8b1834b0e7b76de4c89dc1b6dbc06e59492f1d4929a58fb22ba
78a80da889fb77e1536903aa1d2abef676b1663c0cdff25dc03f16254ea2168e
87bd91609e43807a44ecf378eec46a6f6f2099897da00868fada238745fb83e2
b5af2067aca0965204b2df89019af703c3e3d58f9f3bef8027823e9524ac7e36
6eaec8aaa320b804bf32bde89dfe45ae19c69636b1bd0b38ac0034afd6096d11
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac
420ea11f0973a7f7a4cf45a383861460b1171f5c3e05d1eab79dd64773f7f062
122b415e05176b7dacd00480c811bd68141ce3d793dc41f255e9557f7170898d
5f9c51a62f522601ac6ab84eff1b9c057b3ae2708cc4d04aa13fd0394359894b
c96153ded15fb3782e6a02dd68aacda1d37b9f66dce2bcc70a69d3545db21b81
98d38dc4eb880ea5c5b5492947c26f3a435fd4b7bd51759a3c6aed4def2cdb04
7bb2c4c6302f287eb5ac6fb0bd20ba5c1ef1adfae423ee290b2c305617be7eb7
6704de0ede035873f57ce22930f3d3b0e23ba418723be70870916c330d818c27
5f1c7c05ef502fa4b2bb54351f0ae38a73d25d728e2aa370e739cced90aefb04
84843ae0e91bbacae720437937f1bcea3fcae4d9933d71a07a26a8e81479c0f0
8f39c7257d62b3b16c5418287177b47ba3de6f34937ace8f4b33ce0d5d7b77ab
205b16fb503856c22a47de9919147f75eca374fa0c0b9a63e734483e71bb4a47
88b9fabd26abb085ca896c1f28205fae662d1d201ce50d737d46faed26c8ee0a
d3b95985bbdac941180a93d4e2ce29a9fae660f79b2f740eea472d306cb2a062
57cb2cabaabd38a540ddaa79cbb7b83ceafefff32aca4af2956fd9e78a92e352
b64dac067da9a8b1834b0e7b76de4c89dc1b6dbc06e59492f1d4929a58fb22ba
78a80da889fb77e1536903aa1d2abef676b1663c0cdff25dc03f16254ea2168e
87bd91609e43807a44ecf378eec46a6f6f2099897da00868fada238745fb83e2
b5af2067aca0965204b2df89019af703c3e3d58f9f3bef8027823e9524ac7e36
6eaec8aaa320b804bf32bde89dfe45ae19c69636b1bd0b38ac0034afd6096d11
3fcdecef118704af028e93d5e5624849f86bd6b9af7f67e226675accc5ed44ac
420ea11f0973a7f7a4cf45a383861460b1171f5c3e05d1eab79dd64773f7f062
122b415e05176b7dacd00480c811bd68141ce3d793dc41f255e9557f7170898d
5f9c51a62f522601ac6ab84eff1b9c057b3ae2708cc4d04aa13fd0394359894b
c96153ded15fb3782e6a02dd68aacda1d37b9f66dce2bcc70a69d3545db21b81
98d38dc4eb880ea5c5b5492947c26f3a435fd4b7bd51759a3c6aed4def2cdb04
7bb2c4c6302f287eb5ac6fb0bd20ba5c1ef1adfae423ee290b2c305617be7eb7
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | MAL_Malware_Imphash_Mar23_1 |
|---|---|
| Author: | Arnim Rupp |
| Description: | Detects malware by known bad imphash or rich_pe_header_hash |
| Reference: | https://yaraify.abuse.ch/statistics/ |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.