MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e51d0b81ca8d23771538b6f9f787293c86fb78ad2d30fb09a57a9f8bc301dac7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 12
| SHA256 hash: | e51d0b81ca8d23771538b6f9f787293c86fb78ad2d30fb09a57a9f8bc301dac7 |
|---|---|
| SHA3-384 hash: | c4fd7532f259e834211c610adb0838862ea42c4789cbe2ffd2c8533348e94d96e193ef5806b456c4233ce1ee8cb67023 |
| SHA1 hash: | b7a4b61ddf5bc6d5c394b7c9711301dda05ea664 |
| MD5 hash: | 692a63b81b65b897ec74222d796c0b80 |
| humanhash: | idaho-april-five-berlin |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 283'136 bytes |
| First seen: | 2023-11-15 10:07:01 UTC |
| Last seen: | 2023-11-15 13:04:26 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | c9841028b9dc21821bee70c3fbfd867e (9 x RedLineStealer, 2 x LummaStealer) |
| ssdeep | 6144:zD6cswHTGkIdf487tQi2iklho8Jixi0d:zNswzCj3kr1f0 |
| TLSH | T11F5409D03EB34CB3CEDFB5364BB46044A4E93425658E3764286385A637762B8BD08D7B |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
a59d33669232269be920d6b941cad88a67c443c042c6320fd5897202703a0130
e51d0b81ca8d23771538b6f9f787293c86fb78ad2d30fb09a57a9f8bc301dac7
a0f6588980293c6a7433beef8226b491b3bd6246dc4930d08b45c0eb7b31d84e
513cfd7c3b47cd8acb5b7f0e3365273a1cf6ee0a5f4635a35fb910e574d37d11
b476179f38e223e7ab7f153fd8a0dd1bc382aa4265242b3b632e0f10c5ab0125
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.