MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 da3ec334cde63e58dffd18c920f17ee4991542bd171975f31444ebfd7921e678. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | da3ec334cde63e58dffd18c920f17ee4991542bd171975f31444ebfd7921e678 |
|---|---|
| SHA3-384 hash: | 4672fcb59b1ccf73b0d739966a2eaf7117505b61197bf058866a71f400bde02b54047ff50fdc552877e1b2429c1e445b |
| SHA1 hash: | 9d72868280b00b49e8bb92ed37607573852c1a5b |
| MD5 hash: | 22fe125a35f4f7c865d43fcd9373fd86 |
| humanhash: | hot-red-xray-magnesium |
| File name: | file.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 770'560 bytes |
| First seen: | 2023-05-30 02:49:23 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 12288:5MrEy90CbGRMc3/Wg08ZqD+akBFeWh0Ybw2mHShGduk+EVQp/:FyHb0D+gkSakBFLGtrdur62 |
| Threatray | 347 similar samples on MalwareBazaar |
| TLSH | T1A6F42313F7DA9563FAB92B7068F603C30B75BCE24C74432B2742985E4D72691A472736 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_1 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.