MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f67d1c4f68fecd4a740a26f7b6f9d3cd4d2b87e7507017ee13fa012cc4a11e84. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 17
| SHA256 hash: | f67d1c4f68fecd4a740a26f7b6f9d3cd4d2b87e7507017ee13fa012cc4a11e84 |
|---|---|
| SHA3-384 hash: | 03921b74525db615e6c32fc4b8bdf07d9c1ddea2b0d3be458b6c5722c44d6efa8eba5b8b1a919a0e18a44a6e007ff008 |
| SHA1 hash: | 63b767f6b3080a6c23259edf11c331a3bf4fc71d |
| MD5 hash: | 03ad22e68bdf13b3235b5bb709bf75d5 |
| humanhash: | sixteen-zebra-three-eight |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 1'617'920 bytes |
| First seen: | 2023-10-25 02:42:02 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 49152:VrGSSCTHUAKgguq4aNgfctt0q2PFe7UU5:hSCrU7nl4JfcYPFegm |
| Threatray | 2'745 similar samples on MalwareBazaar |
| TLSH | T1D575231363E48572D9BA13706CF217932A3ABD7A8D71039F6741D82E1C727A46037B7A |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.124.86:19084
http://77.91.124.1/theme/index.php
http://host-file-host6.com/
http://host-host-file8.com/
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.