MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f038fe75bad539b5de33461024a9c3189ba7e5173d42a95b58fe44a4520fd442. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | f038fe75bad539b5de33461024a9c3189ba7e5173d42a95b58fe44a4520fd442 |
|---|---|
| SHA3-384 hash: | 67da9939aa9a9d9da9ac44df14d94dbfdc9695d996ff85ffe91971db5902456f36587074b5fb4e3f6fe50a71fce91a0c |
| SHA1 hash: | 59ac7ccc52534a0eda8dca3c71ced770a5cddb9e |
| MD5 hash: | 810f35e91727b324159ac0ef491b4efa |
| humanhash: | nuts-victor-fifteen-mississippi |
| File name: | 810f35e91727b324159ac0ef491b4efa.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 321'024 bytes |
| First seen: | 2023-08-08 01:50:16 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 041d48491af33996afda7a32ee725dc6 (4 x RedLineStealer) |
| ssdeep | 6144:OgLL6W+Rr1CuXUjhzlrDwU6b/GfgHnicFIlNyKe:xP+RJshzlRXf6iQI3yz |
| Threatray | 266 similar samples on MalwareBazaar |
| TLSH | T16464E043A2F0EC71D4378A715F2BC7E87A6EF430AD658B6722449B6FC9312A1DA57301 |
| TrID | 37.3% (.EXE) Win64 Executable (generic) (10523/12/4) 17.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 16.0% (.EXE) Win32 Executable (generic) (4505/5/1) 7.3% (.ICL) Windows Icons Library (generic) (2059/9) 7.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 00002c285a124109 (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
4401ff9bde7c8fa01c34a3b90959ae1e41eba1ca2e0fc6ce57ecce3a34dd25ad
0b3a85c926bf9c26d5c2543bd15cee6616b33f296b5b428ef91c4c8e142928e8
ed3c455abb23addb14d8f45029a3c5e4e39b4d2a3d3d50e66db88002ce5b3d80
6360e3e724063c4aa184a9482cc96bf795a3f64ee54a3e48c635b7f44e62753c
0c144ab019111f46d17595facd64fafc70cde0e91017ca8ced0454de9ed7df68
fb5088d43c6a40ba6f1cbc8badf50f4151cb993e835295a6e68527f506e389e2
7bf3f2e7b01a6def023479988f460ecf9bae1d94379be2e3a3bfc58a0e0644c8
2d65d26ca3a66a722a983d62038d6c2bdd4729483ea6a23d15aee005491fc3c3
e1d680bc0112e599878b0c7fa09c89082d4d2d8620ed5e1d3a697083741c13dc
7a4e53909040cb03844bea013b2857e4848965162c74fd49f6a96331e678e517
4401ff9bde7c8fa01c34a3b90959ae1e41eba1ca2e0fc6ce57ecce3a34dd25ad
0b3a85c926bf9c26d5c2543bd15cee6616b33f296b5b428ef91c4c8e142928e8
ed3c455abb23addb14d8f45029a3c5e4e39b4d2a3d3d50e66db88002ce5b3d80
6360e3e724063c4aa184a9482cc96bf795a3f64ee54a3e48c635b7f44e62753c
0c144ab019111f46d17595facd64fafc70cde0e91017ca8ced0454de9ed7df68
fb5088d43c6a40ba6f1cbc8badf50f4151cb993e835295a6e68527f506e389e2
7bf3f2e7b01a6def023479988f460ecf9bae1d94379be2e3a3bfc58a0e0644c8
2d65d26ca3a66a722a983d62038d6c2bdd4729483ea6a23d15aee005491fc3c3
e1d680bc0112e599878b0c7fa09c89082d4d2d8620ed5e1d3a697083741c13dc
7a4e53909040cb03844bea013b2857e4848965162c74fd49f6a96331e678e517
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | MAL_Malware_Imphash_Mar23_1 |
|---|---|
| Author: | Arnim Rupp |
| Description: | Detects malware by known bad imphash or rich_pe_header_hash |
| Reference: | https://yaraify.abuse.ch/statistics/ |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.