MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 ffa5036ac28ddf219766bee866974128fcd7f1f2afd77736adf4749871346466. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RedLineStealer
Vendor detections: 15
| SHA256 hash: | ffa5036ac28ddf219766bee866974128fcd7f1f2afd77736adf4749871346466 |
|---|---|
| SHA3-384 hash: | e289d46a77e38cc23d341fdef1a1a93683c578e40df210f4851a0ebfae1de39c60fab0b00461a0398926c54d9aab6cc4 |
| SHA1 hash: | 32937c3cc04f5bc867c8754ca650ef5161da9210 |
| MD5 hash: | a6f85a21523cc9ffdd385b00dafc8bd9 |
| humanhash: | mango-enemy-bakerloo-west |
| File name: | a6f85a21523cc9ffdd385b00dafc8bd9.exe |
| Download: | download sample |
| Signature | RedLineStealer |
| File size: | 953'632 bytes |
| First seen: | 2023-12-11 02:05:29 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 6b37f11fc7c7acdee17d5888878cc6f9 (4 x RedLineStealer, 3 x LummaStealer, 2 x RiseProStealer) |
| ssdeep | 12288:CoiKQe7S/+322Ghabdq399BObcCiZFU6d5WDAWHKVbnIGWBuhNy3qXDYMB:uKO/+3HGhabdO9pe6f8/SMPL6XUMB |
| Threatray | 4'392 similar samples on MalwareBazaar |
| TLSH | T144158E2138C09372EEE320B746ECB62542ADD4B4071516DF46D85BEEDB607C27F36A86 |
| TrID | 32.2% (.EXE) Win64 Executable (generic) (10523/12/4) 20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 15.4% (.EXE) Win16 NE executable (generic) (5038/12/1) 13.7% (.EXE) Win32 Executable (generic) (4505/5/1) 6.2% (.EXE) OS/2 Executable (generic) (2029/13) |
| Reporter | |
| Tags: | exe RedLineStealer |
Intelligence
File Origin
NLVendor Threat Intelligence
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Malware Config
77.105.132.87:6731
176.123.7.190:32927
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | DebuggerCheck__API |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | DebuggerException__SetConsoleCtrl |
|---|---|
| Reference: | https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara |
| Rule name: | maldoc_find_kernel32_base_method_1 |
|---|---|
| Author: | Didier Stevens (https://DidierStevens.com) |
| Rule name: | NET |
|---|---|
| Author: | malware-lu |
| Rule name: | PE_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
| Rule name: | PE_Potentially_Signed_Digital_Certificate |
|---|---|
| Author: | albertzsigovits |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.