MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 f777af65794f92a5949ed2e63a9718dee0b98c9771222473461af19a91ed6f79. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 16
| SHA256 hash: | f777af65794f92a5949ed2e63a9718dee0b98c9771222473461af19a91ed6f79 |
|---|---|
| SHA3-384 hash: | c83e7b34fa3cdd136862dc89aaf5d0c0991798a994cb5c89cb7299e63ebacf363f9b8fa48bffa650494a925619ec2a6a |
| SHA1 hash: | 31c7e03e07a86a618302e3859af77c1bbb686aee |
| MD5 hash: | cb6a13a7ba98287c104f4c50e3774190 |
| humanhash: | football-golf-fish-high |
| File name: | cb6a13a7ba98287c104f4c50e3774190.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 796'160 bytes |
| First seen: | 2023-06-14 07:30:40 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 646167cce332c1c252cdcb1839e0cf48 (8'473 x RedLineStealer, 4'851 x Amadey, 290 x Smoke Loader) |
| ssdeep | 24576:ByFwlNBkTEVggUnw13Bm8CrVTqf5503e:0FwRrggkw1347VT |
| Threatray | 824 similar samples on MalwareBazaar |
| TLSH | T1B5051242FAEC5173EC7527B008F64B971B3ABDA0AE61432B3785A4071CF3694A572367 |
| TrID | 70.4% (.CPL) Windows Control Panel Item (generic) (197083/11/60) 11.1% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 5.9% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5) 3.7% (.EXE) Win64 Executable (generic) (10523/12/4) 2.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) |
| File icon (PE): | |
| dhash icon | f8f0f4c8c8c8d8f0 (8'803 x RedLineStealer, 5'078 x Amadey, 288 x Smoke Loader) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.91.68.30/music/rock/index.php
Unpacked files
4cc01e8d7051494d6e9401f82cef1ff36fd573144edb8aa547d4692eb76a9632
531697738693f86a82f61cd051b0d6281e6fe6d789791525c35c3ada991a7f31
e8f5a6e4da45ed2ef4566266b31858251db870931c6fc2b7175a21dd2c2ee3b5
c468bd5efd74928270e3ed0dd95ba7a089200ef30d22e52f2edd8b0544f9c020
1da0644ac098e2c392c1cdab654f8f9d95b0af32471cc1edbe912a842641df31
f777af65794f92a5949ed2e63a9718dee0b98c9771222473461af19a91ed6f79
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | detect_Redline_Stealer |
|---|---|
| Author: | Varp0s |
| Rule name: | INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender |
|---|---|
| Author: | ditekSHen |
| Description: | Detects executables embedding registry key / value combination indicative of disabling Windows Defedner features |
| Rule name: | pe_imphash |
|---|
| Rule name: | Skystars_Malware_Imphash |
|---|---|
| Author: | Skystars LightDefender |
| Description: | imphash |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.