MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 cceb3dc1a54d4e14e7b2dac2489e5cd6194c0f51b064f6e726229fb798deb20e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | cceb3dc1a54d4e14e7b2dac2489e5cd6194c0f51b064f6e726229fb798deb20e |
|---|---|
| SHA3-384 hash: | 6a12adee3283e31b49737f16e4ae008caf64f1175c2eab252ac0fbd9ef8c171493beb81ba6ef2f3db385aa15097b0552 |
| SHA1 hash: | 8bed0b5da45422d839446df8f87dec514b88b848 |
| MD5 hash: | 6029b53a99c95c89f05348134130ef59 |
| humanhash: | jersey-bakerloo-solar-summer |
| File name: | 6029b53a99c95c89f05348134130ef59.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 786'432 bytes |
| First seen: | 2023-07-16 07:26:14 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 12288:1MrOy90ds4JKIlZCuYpzqJ8x0KfiaI/e1lDsyCPLVD+trmFGEkh4aWF:LyAkgC0pKVIIDUPhCtrmFk4RF |
| Threatray | 639 similar samples on MalwareBazaar |
| TLSH | T134F42287B7D90075E8B66B3048FB01A32735BDE05D78822B36D1E99F1CF2289A571367 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
5c392e2a2961e96d305b3ed9af854e043f75ae80b219c612fbc6cd000399f7d6
c723ad5514f1c882ec25abe3f86f8c37845ca600747a258a5d54ac596d27f6df
6c411da48b1bf36ea29f2f6e02278bb6caaf29ab4feece5daabe4dbbf50772d2
fcac8cf6b213571ff661d9bb69a53c059d69ef6f6858b8306906b5575d14ed49
cceb3dc1a54d4e14e7b2dac2489e5cd6194c0f51b064f6e726229fb798deb20e
2cd70321a7f4a39e0fa291841d388eb1f565c800d45aea6db90af9081462fd17
75ccbf328f1e4ec3537ebd63e6afcf1b951f8765d8b1c734b87a7073333332af
c723ad5514f1c882ec25abe3f86f8c37845ca600747a258a5d54ac596d27f6df
6c411da48b1bf36ea29f2f6e02278bb6caaf29ab4feece5daabe4dbbf50772d2
2b0c74155065ebee97b8bdef3b76c62a66664b2c27f6becab3483a1eacaee1ab
cceb3dc1a54d4e14e7b2dac2489e5cd6194c0f51b064f6e726229fb798deb20e
eae2ebbd7384f13f7ddae701193b9c408f5b7b831268f0029bf72e137ba2d0d1
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.