MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e1c417cdc500c29e12ee68d5bc4e52314d045031b5380b7854b4b34ec9ea0abe. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | e1c417cdc500c29e12ee68d5bc4e52314d045031b5380b7854b4b34ec9ea0abe |
|---|---|
| SHA3-384 hash: | a3880f1df27a70d46824046c4d1c0096d1f375d39ef4743581501d93cabd6fd5d9747866fe26acf619653194159c58b3 |
| SHA1 hash: | 7c32c0dbba1dc28b33d61647ed1cce57414fbd34 |
| MD5 hash: | 629c3b9bae76e2f3dd5a14cebdfeb635 |
| humanhash: | iowa-spaghetti-summer-mike |
| File name: | 629c3b9bae76e2f3dd5a14cebdfeb635.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 435'712 bytes |
| First seen: | 2023-08-19 11:11:29 UTC |
| Last seen: | 2023-08-19 11:43:03 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | f34d5f2d4577ed6d9ceec516c1f5a744 (48'649 x AgentTesla, 19'454 x Formbook, 12'202 x SnakeKeylogger) |
| ssdeep | 12288:dzYTt8BnSF8E1GDaeb2BHWGEQurA37lADGwe6nM3p2:dzBnUtGd1AyDY6 |
| Threatray | 22 similar samples on MalwareBazaar |
| TLSH | T1F594CFD8A3AC1022FFFBCF682C606F54E83991205FBA6554C2EB08D956B5CD5F02925F |
| TrID | 67.7% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13) 9.7% (.EXE) Win64 Executable (generic) (10523/12/4) 6.0% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 4.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 4.1% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
http://taibi.at/tmp/
http://01stroy.ru/tmp/
http://mal-net.com/tmp/
http://gromograd.ru/tmp/
http://kingpirate.ru/tmp/
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files
08e61151199e31c2cf54f12f95c8ad95ee8467bb630166800114c0b912682a74
1e662d2a9bc77dc09ff39c21dbd8f11968da7c1dea6f4bbcfc5216c0d8f8c8fd
eef2be5347236331ecd365bdf33ef868b6518beb7ae94074be56f955d2a951d7
6531b801cc6cbf4139616803f9d43e9b886eed6c9ca82b86bb9c461c50f673a0
dc8ce8ab78c6cdddfd1ccd40a3b8d4d177a9ab9de871bbf9e81c54b97e29a342
2dea8cfcd31f4675d5462c385139b59528759bee88aec34ed9d0757d289e7a34
e3cc5f126472497826ad34d0e0348d3d0a0dea126d5ec73c5ed1a6eaf8f6272d
4d7a22a1f7d76310b2c8420cb2f02ef4633cb689e4b8eaaab165731b9341163f
2d90e4d6aabf27b3e3babbb6846ed261f650f885858be57a2def6a5e361071b7
68af9af3506c7a35ef60026b6662cbc1fda0b36007a6eb48a974e4d7574db21f
81d2aa64b3f784fc0dab7694d106bedbd193786ab47dd064c0c5a8714d3fcaff
4458a9df5275bedd921127f4ff9dc63d4ac107f2e89cf46969e96f4c43d9f93e
23d2138b76775d5169145dedfaff7db5bca58b481994ced84cade8490e720fc1
f991e808ed44c731fea1758fd6a275ec4e3ee66a5a691dbf1f9414a5faa144a1
10c5faf1316a4caf9edafd41c9c5a87a346c3cceb81de7ca106eee22be3069b8
e1c417cdc500c29e12ee68d5bc4e52314d045031b5380b7854b4b34ec9ea0abe
08e61151199e31c2cf54f12f95c8ad95ee8467bb630166800114c0b912682a74
eef2be5347236331ecd365bdf33ef868b6518beb7ae94074be56f955d2a951d7
6531b801cc6cbf4139616803f9d43e9b886eed6c9ca82b86bb9c461c50f673a0
dc8ce8ab78c6cdddfd1ccd40a3b8d4d177a9ab9de871bbf9e81c54b97e29a342
2dea8cfcd31f4675d5462c385139b59528759bee88aec34ed9d0757d289e7a34
e3cc5f126472497826ad34d0e0348d3d0a0dea126d5ec73c5ed1a6eaf8f6272d
4d7a22a1f7d76310b2c8420cb2f02ef4633cb689e4b8eaaab165731b9341163f
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__RemoteAPI |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | MALWARE_Win_DLInjector04 |
|---|---|
| Author: | ditekSHen |
| Description: | Detects downloader / injector |
| Rule name: | msil_rc4 |
|---|
| Rule name: | NETexecutableMicrosoft |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | shortloader |
|---|---|
| Author: | Nikos 'n0t' Totosis |
| Description: | ShortLoader Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.