Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
15351b2c7f5dac02673eb25bac67cce80d7b4dc72eb69b6ba5f6e0372143248c.exe
Resource
win7-20240903-en
General
-
Target
15351b2c7f5dac02673eb25bac67cce80d7b4dc72eb69b6ba5f6e0372143248c.exe
-
Size
255KB
-
MD5
a82c244f1db180a7f5c3b2e43d9f99d5
-
SHA1
f6d114c43e7c97d299f021cb52f6aa02393ec377
-
SHA256
15351b2c7f5dac02673eb25bac67cce80d7b4dc72eb69b6ba5f6e0372143248c
-
SHA512
41f026f5d9a4caf328f4ab3993eb25b2af944b50eef2fd8513fadb441130ca3fb7b866d0740c6bf53b7dd728ce8eae1719b96a0b14ae625cf4bd05a1afdd7795
-
SSDEEP
6144:yLgJNsUXdyoP5ra0buOcanEsX+Yf+Nm01mg:kgJBXdd5zfcVBQ+rmg
Malware Config
Extracted
redline
185.215.113.29:8678
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/1288-4-0x0000000003F10000-0x0000000003F34000-memory.dmp family_redline behavioral2/memory/1288-7-0x0000000004100000-0x0000000004122000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/1288-4-0x0000000003F10000-0x0000000003F34000-memory.dmp family_sectoprat behavioral2/memory/1288-7-0x0000000004100000-0x0000000004122000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15351b2c7f5dac02673eb25bac67cce80d7b4dc72eb69b6ba5f6e0372143248c.exe