MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 e9c59b97d4d0be711dc6a0f47d8b16fa6d4e0a8cbfab702ab9f0642d1825319b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 18
| SHA256 hash: | e9c59b97d4d0be711dc6a0f47d8b16fa6d4e0a8cbfab702ab9f0642d1825319b |
|---|---|
| SHA3-384 hash: | f6432cf3f3c373ecec75700f4fa60abdf5e58ea0dc85242eb3fe4961655b09e7c2dd64a0113297c99ba2ed1f7c0a99ed |
| SHA1 hash: | f477a79d335ab48a2f947cc1675eaeeea69cf33d |
| MD5 hash: | ee539424f2973dd2a45ab3b8f10128b6 |
| humanhash: | venus-muppet-venus-nebraska |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 987'136 bytes |
| First seen: | 2023-06-25 15:07:07 UTC |
| Last seen: | 2023-06-26 02:32:24 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 031de5dc510e9e46afc18b1a5c0c3814 (2 x RedLineStealer) |
| ssdeep | 12288:RRRDg99w/4aRmKCOrWtLvvsdO66GlJh69KRNjpgcf0vBPJJeRIlIu45y8jyISQRb:R0bDaRmZOrWtLv0dO6DJEE0vBPJJfdi |
| Threatray | 342 similar samples on MalwareBazaar |
| TLSH | T16B257D2179B49176EDE220BA45FFBD21C2EDE0B00B350BC75AC95BEED62C1D12E31586 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
152325939d1d204fa0e5c1a4d53f7bdd830716fe0a178afd1d6d8786e155376e
d3612d86dd331faf9e5b556f23d612448f2d1ecb3b82cb7f5fdbf7771635d6e0
d35e7b84acffc8961da9ba5b2c097f4861622118919e2a430bac6f4fbad1195e
104169a70b4443342fea2349028c90b5dd65571cfdf0279941783599ccc3302b
2cac970a74cf3c21383ea093fef86dc2628898343935d2eb7be8802a758548ed
66550a7bbc34d6771e64349f28312916eeab33f81b5b266849f7301e4a1a4186
0f9752d8be749b79645cc6354dde8042efe55c3757cbc2f5249503c9cb0f602e
8334053ab6404ecce1437bd14a64d812bd0f49e898dc818e5efd3a3523023f02
4af55a79245502d5996bc221af187ae7d92d8ce9ae4f0474bc955ab19429b608
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | AppLaunch |
|---|---|
| Author: | iam-py-test |
| Description: | Detect files referencing .Net AppLaunch.exe |
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | detect_Redline_Stealer_V2 |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | pe_imphash |
|---|
| Rule name: | redline_stealer_2 |
|---|---|
| Author: | Nikolaos 'n0t' Totosis |
| Description: | RedLine Stealer Payload |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.