Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 18:35
Behavioral task
behavioral1
Sample
059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exe
Resource
win7-20240729-en
General
-
Target
059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exe
-
Size
92KB
-
MD5
56d354370f34d83e8c02b5ca8233814c
-
SHA1
2dced50dd38dcced3741e874ea7fa699ccc31a63
-
SHA256
059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574
-
SHA512
25263fdb3163a72b91bc121695e98a36fd536219a4afab2c323a95d290333124098d804cc03e21300e61e4105fdd899a90a65c2554077241a3152c387db63c82
-
SSDEEP
1536:YsAbQDR0ObCqu8Stb5+K3Zy99BGkVNb4AZTGqG3Evy6Jd5MOStx95EvJV:Y/bFObPJA+bNVdfzG3QyedmOJvr
Malware Config
Extracted
redline
melo
209.141.40.170:45958
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1792-1-0x0000000000860000-0x000000000087C000-memory.dmp family_redline -
SectopRAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1792-1-0x0000000000860000-0x000000000087C000-memory.dmp family_sectoprat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exedescription pid process Token: SeDebugPrivilege 1792 059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exe"C:\Users\Admin\AppData\Local\Temp\059d9ab215882be4379f219a323b4bff6899174b9c987740aeac5a4f4ff5f574.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1792