Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03-03-2024 21:13
Behavioral task
behavioral1
Sample
1712-150-0x0000000002450000-0x0000000002494000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1712-150-0x0000000002450000-0x0000000002494000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1712-150-0x0000000002450000-0x0000000002494000-memory.exe
-
Size
272KB
-
MD5
5887378b922d96268c8723be82880997
-
SHA1
4c9f591ef99e918fb3e067f7c9a0a50be46785fb
-
SHA256
d8bc517a4b2db403f85a5cac209dd50ae1538ef25c5bb22258d94c2b89b15e61
-
SHA512
e31c4e4eda87440224d7f39b5130e192f7ccc519b20cc49379ae69073409bfd818f6c592e4d7873d89c48e1939e7c9b38fe146929f23744150f05a2328a339b5
-
SSDEEP
3072:/z6jYELL6VXXCG/SyVXtwkw/em3EvLc9Cao40VBaw8hUJnSVJBb7xNn2pU9f2MK8:/z6jU1KyZtwLe2EvLcSJ8hinSVJB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-0-0x0000000000390000-0x00000000003D4000-memory.dmp family_redline -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1712-150-0x0000000002450000-0x0000000002494000-memory.exedescription pid process Token: SeDebugPrivilege 2040 1712-150-0x0000000002450000-0x0000000002494000-memory.exe