Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 08:34
Behavioral task
behavioral1
Sample
952-149-0x0000000002260000-0x00000000022A4000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
952-149-0x0000000002260000-0x00000000022A4000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
952-149-0x0000000002260000-0x00000000022A4000-memory.exe
-
Size
272KB
-
MD5
0c5e66c82d19fccfa7a73eb204e1f067
-
SHA1
e901182e6025ba9bc80c6bf08ff766e1ca55fe70
-
SHA256
c2a0428b491a806a033159f3839e4f511b5b84318c2ef07c61c28f70c8b9ce80
-
SHA512
46af1a67aca350b9f7efc449119cc524fd4860c0d23eda8dc7156d57d69fc9bdad4abb67be7ce3073c887f34c61086a7ea7f2c92fe61d4502ff6025a45c16971
-
SSDEEP
3072:Z6j4ELN6FY9CLJKymfAwUsmLo0XvqpvtvLn9Fo40n32jThSinnMZSonYBxNn2pUx:Z6jixKymfAwILo0avtvLnc0Thznnto
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2028-0-0x0000000001300000-0x0000000001344000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
952-149-0x0000000002260000-0x00000000022A4000-memory.exedescription pid process Token: SeDebugPrivilege 2028 952-149-0x0000000002260000-0x00000000022A4000-memory.exe