MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f3ae45b1b3d94db9082f02588979131b612302d97a0be10b257ec0e1f0e81419. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | f3ae45b1b3d94db9082f02588979131b612302d97a0be10b257ec0e1f0e81419 |
|---|---|
| SHA3-384 hash: | fb72f49ff4401fda462b0daf3330a6a6c6129569dbc381a313d1ed2df4fd2e134ec373df96a7dfb311a6329f37ae067e |
| SHA1 hash: | 32aebb4b338b0e40fc815da2824e761347250065 |
| MD5 hash: | 72bda26573fd4f268cdbb676f2b5b2c1 |
| humanhash: | earth-maryland-alanine-kansas |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 433'664 bytes |
| First seen: | 2023-05-12 15:15:54 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | ec65e6f92ccc76ed34358795395fdcf8 (2 x Smoke Loader, 2 x RedLineStealer, 1 x TeamBot) |
| ssdeep | 6144:N9/4uBTw4Ev7EzK4drIo55m2wJjSDTDaDTlH0XVrgkeT:Nl9BTwnvwjJwcfaDdL5T |
| Threatray | 13 similar samples on MalwareBazaar |
| TLSH | T1BC948D5366E0BD70E66246329E1EC6F8F79EF5608F5937AA1219FA2F05B01B2C173311 |
| TrID | 47.3% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 15.9% (.EXE) Win64 Executable (generic) (10523/12/4) 9.9% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.6% (.EXE) Win16 NE executable (generic) (5038/12/1) 6.8% (.EXE) Win32 Executable (generic) (4505/5/1) |
| File icon (PE): | |
| dhash icon | 70d0dec2cacad2dd (1 x RedLineStealer) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | MALWARE_Win_RedLine |
|---|---|
| Author: | ditekSHen |
| Description: | Detects RedLine infostealer |
| Rule name: | MAL_Malware_Imphash_Mar23_1 |
|---|---|
| Author: | Arnim Rupp |
| Description: | Detects malware by known bad imphash or rich_pe_header_hash |
| Reference: | https://yaraify.abuse.ch/statistics/ |
| Rule name: | Windows_Trojan_Smokeloader_3687686f |
|---|---|
| Author: | Elastic Security |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.