Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 04:28
Static task
static1
Behavioral task
behavioral1
Sample
8f6aca0f53b40eeae16a5abacf2a7c0b83b3bb91ad8cae655b983bc6d35434f3.exe
Resource
win7-20240708-en
General
-
Target
8f6aca0f53b40eeae16a5abacf2a7c0b83b3bb91ad8cae655b983bc6d35434f3.exe
-
Size
224KB
-
MD5
2944075641b664bf5018b161271a5ae9
-
SHA1
c17afffe9b8bf32fee6303be1d6e36136f3f96bb
-
SHA256
8f6aca0f53b40eeae16a5abacf2a7c0b83b3bb91ad8cae655b983bc6d35434f3
-
SHA512
549d82e4ee20883224ab7f45165b21edc4136dd91ac58a62c1e536cee7443fa557f3ed35b60d25582153ab609d83a801eed6f413d738dcf71b889ba8afc87d77
-
SSDEEP
3072:P45XkJFv17pqZ0kmFqxn7uaFyCOZy0HJAcKZmd91pScwuk5GppH/z:P4gvRzIxnZSZVpAT0pS6p
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2400-5-0x0000000002400000-0x0000000002426000-memory.dmp family_redline behavioral2/memory/2400-7-0x0000000002740000-0x0000000002764000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2400-5-0x0000000002400000-0x0000000002426000-memory.dmp family_sectoprat behavioral2/memory/2400-7-0x0000000002740000-0x0000000002764000-memory.dmp family_sectoprat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8f6aca0f53b40eeae16a5abacf2a7c0b83b3bb91ad8cae655b983bc6d35434f3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f6aca0f53b40eeae16a5abacf2a7c0b83b3bb91ad8cae655b983bc6d35434f3.exe