MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f4b13266b7712eda82b5e2a578aaefbb8c5aaba21a80114ec912aac7b34f5a4b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 13
| SHA256 hash: | f4b13266b7712eda82b5e2a578aaefbb8c5aaba21a80114ec912aac7b34f5a4b |
|---|---|
| SHA3-384 hash: | 93a733314cdf87199533283f89a711fbbe56cb3396e4bb614c9d356dfd89521186ddd556e175150724e4d8a93e7e9a98 |
| SHA1 hash: | 6767de9ee53857bb27545ff76aebd13a6b560153 |
| MD5 hash: | 6e3e2d54153900214a1dd8b498ad9e1a |
| humanhash: | cat-winner-bravo-hawaii |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 334'152 bytes |
| First seen: | 2023-12-09 20:41:55 UTC |
| Last seen: | 2023-12-10 08:16:56 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 0622dc360ffbda00211e6d25779cd2ea (13 x RedLineStealer) |
| ssdeep | 6144:WTLRXjwMiu2n6ymsalNY/QbLGToVDCBfOVDgrWyRvbGOU:WPRXjiuK6ymsSNY/4GToVDC5OVDgrWyw |
| Threatray | 2'039 similar samples on MalwareBazaar |
| TLSH | T1D06429B27C84C2EAE2E3C9787C5ADB4D3415A912419607AEEA9D7DFF47D04AB607430C |
| TrID | 45.5% (.EXE) Win16 NE executable (generic) (5038/12/1) 18.3% (.EXE) OS/2 Executable (generic) (2029/13) 18.0% (.EXE) Generic Win/DOS Executable (2002/3) 18.0% (.EXE) DOS Executable Generic (2000/1) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | INDICATOR_EXE_Packed_ConfuserEx |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables packed with ConfuserEx Mod |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | pe_imphash |
|---|
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.