MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 fe737e46b1faff8183e6114d2e48d9e2ef7256a1eecd0ec5e7ea7dadc18b3434. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | fe737e46b1faff8183e6114d2e48d9e2ef7256a1eecd0ec5e7ea7dadc18b3434 |
|---|---|
| SHA3-384 hash: | 98d58eb17d1a80401e87123b43b95b8043eb5e1f432f5a91c91e4949e315fece1fff1c89ce23f6ae7a9757e10e28a345 |
| SHA1 hash: | 24f71741919c7319c8a6c100f2fe8b974891c75b |
| MD5 hash: | c8b1ee9fb8c10cc5259a0abc2f0b82f0 |
| humanhash: | magnesium-indigo-mango-nebraska |
| File name: | file |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 2'070'816 bytes |
| First seen: | 2023-11-17 15:27:47 UTC |
| Last seen: | 2023-11-18 11:27:27 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 4e4a6bcb0a4d906241efada3b9ef82b0 (6 x RiseProStealer, 2 x RedLineStealer) |
| ssdeep | 24576:25eMU2JApE013tn/g+/+LLnxBF6a9Dhvh1bKoZMkm:25eTE013tn/1+t6a3vHWoZMkm |
| Threatray | 7 similar samples on MalwareBazaar |
| TLSH | T153A55D1136F94B99F9F31EB85ABAA611093AFC698F11C3DF2250648E1D30BD09971B37 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
andretavare5
Sample downloaded from https://vk.com/doc278414724_666949528?hash=rT7D26X7JmzouPeAIi3p5UzBlnaSXAKeZR0FwkX1bMz&dl=IouzWzIZeCcwzj6ZyGkD0uyY1VBFDS1AiJ968zzdRks&api=1&no_preview=1#1Intelligence
File Origin
USVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
Unpacked files
871c57f351c6debafe3210ce09ccdb78f8ec84223ac7d70ab96126b1bf5f6d6c
7fe58a57ec935872f4c4d04330cd28bed9ad7838ab7f06722505c04c72eab0a1
fe737e46b1faff8183e6114d2e48d9e2ef7256a1eecd0ec5e7ea7dadc18b3434
04f289c698fef1e3e06e1062195919d5255c7b4ae768ebad747b6705d8c3bbf0
bdcf936171dfe292012dadd6e9e9c8a185f4010a870b8b3713d916c93e2cad2c
086d8f48191a2f42e6226f49c338a41c5e76fd7a1b2a302f839d6acfc609aec3
3d24b1f5f73814b3b9e9812510cbad2231eb4fbfafc010bcc20b3d0df2509422
YARA Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.