Analysis
-
max time kernel
20s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 00:15
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Launcher.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
lAuncherSLXLJG.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
lAuncherSLXLJG.exe
Resource
win10v2004-20240802-en
General
-
Target
lAuncherSLXLJG.exe
-
Size
519KB
-
MD5
d9aa145f3a5f5e68f395e5040391b897
-
SHA1
be6d0c1fd331f8d07053f210815d5563388a0c53
-
SHA256
611769a840e8dd1c759911c4c5a91dccdbb55acc520370acc94e2904ab4e273a
-
SHA512
2298a17f45e2da8180a6b1163899230b4a62d6bcd561906c1fc5deaa8f41a9c0247afb155cd2fc9c90f95d94252a09f627f1e177089379a9b522f1b55dbebe94
-
SSDEEP
6144:88w3SW3or/Q5oxqt630Xb6sGfsGQpJgUgC8tgfLxoNpNtvbiWlYD1zRqzTrN:88aor/moViUfgJKIxoNTtzoEzTrN
Malware Config
Extracted
redline
45.15.156.142:33597
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral4/memory/2232-0-0x00000000011A0000-0x00000000011F2000-memory.dmp family_redline -
Program crash 1 IoCs
pid pid_target Process procid_target 4432 2232 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lAuncherSLXLJG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lAuncherSLXLJG.exe"C:\Users\Admin\AppData\Local\Temp\lAuncherSLXLJG.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 8842⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2232 -ip 22321⤵PID:1156