MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 d5a73bf70142fca50a74f6a295e2a09dd2396692ebb03e0733f33a9485d7a3c5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | d5a73bf70142fca50a74f6a295e2a09dd2396692ebb03e0733f33a9485d7a3c5 |
|---|---|
| SHA3-384 hash: | c932e5d32d4a287e9b452f8fea779e818812ae68d4847791823bf718955c913502fd5ab07457d677bf8f8934f4e287e3 |
| SHA1 hash: | 0a4993d9b3441e304e8f8f44877614ba27e6ce99 |
| MD5 hash: | 3121e7efe32c203433e71035d9e82bb3 |
| humanhash: | one-hydrogen-louisiana-harry |
| File name: | 3121e7efe32c203433e71035d9e82bb3.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 794'624 bytes |
| First seen: | 2023-06-14 08:35:42 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:Xy6k1t1FMHyjwYsQVzJsLKBnxzln6pQy3d:iJt7MmVdHBnxp6pZ |
| Threatray | 832 similar samples on MalwareBazaar |
| TLSH | T107F42253A6E89472CCF17BB018FA12D70A36BD52497883662B564C1E4CB3AC99D3472F |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.68.30/music/rock/index.php
Unpacked files
4c7aca439ee1e17da2f067197025d768317dc4f0094397f8da48f33941fcaa2b
531697738693f86a82f61cd051b0d6281e6fe6d789791525c35c3ada991a7f31
d2449cc89ac83328aeafc33a6c83f6a79165d08db887bae12c80a7bc5ea50e8e
8271105109e78e0fcf19fada4140231e93f6290efe7654d1c0fe92acb91a11ca
e8f5a6e4da45ed2ef4566266b31858251db870931c6fc2b7175a21dd2c2ee3b5
6b0b70b1849ca2913ca4c5cdc390691d23194123807a39e99240af81485b5bae
0484f64319255ae85abdf651326d516e0409a4b366b0a6ec80a1d3b6a6a10365
0a9668442ba25c144be0efe0348d32c9376af8d5729741eeeaf9dd4ba4a41099
c468bd5efd74928270e3ed0dd95ba7a089200ef30d22e52f2edd8b0544f9c020
51a075dc2da10d7ff1553fe1e504133f4e2cb4e984f6e5127d9e81616f2a0623
86e2c600b2e3e5be7af6c23365e9b44ee43cdbe2d6e2c2689f39ae752d522091
43ce833e235d033bb322611f4789a3d54037b9dbb23397748af2bf71addd4606
08d35da19df385f60fd842308a6c0f7c84eccc8dbcefda02e7c099939e1a8b36
864d66b4e83d7a86cdb77eaac5f9cf3d288f095ff9b10709322c264c83e107ab
60d2cf2c913b15b31d23cb2f16bed946692a82420df61d037a356b9b35ad2f7d
d5a73bf70142fca50a74f6a295e2a09dd2396692ebb03e0733f33a9485d7a3c5
d2449cc89ac83328aeafc33a6c83f6a79165d08db887bae12c80a7bc5ea50e8e
8271105109e78e0fcf19fada4140231e93f6290efe7654d1c0fe92acb91a11ca
6b0b70b1849ca2913ca4c5cdc390691d23194123807a39e99240af81485b5bae
0484f64319255ae85abdf651326d516e0409a4b366b0a6ec80a1d3b6a6a10365
51a075dc2da10d7ff1553fe1e504133f4e2cb4e984f6e5127d9e81616f2a0623
86e2c600b2e3e5be7af6c23365e9b44ee43cdbe2d6e2c2689f39ae752d522091
43ce833e235d033bb322611f4789a3d54037b9dbb23397748af2bf71addd4606
08d35da19df385f60fd842308a6c0f7c84eccc8dbcefda02e7c099939e1a8b36
864d66b4e83d7a86cdb77eaac5f9cf3d288f095ff9b10709322c264c83e107ab
60d2cf2c913b15b31d23cb2f16bed946692a82420df61d037a356b9b35ad2f7d
d5a73bf70142fca50a74f6a295e2a09dd2396692ebb03e0733f33a9485d7a3c5
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.