Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665.exe
Resource
win10v2004-20241007-en
General
-
Target
c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665.exe
-
Size
298KB
-
MD5
d1848bbd595407e446683c5411cfbc6e
-
SHA1
3d2f7c94b335c6b203c9f2abc407c9e76ddda296
-
SHA256
c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665
-
SHA512
47558f592536183880924a075a2baad47f46690cf324fa1b9786da608785aec274c9062ae3b7811cc1be82c2ccc46dcc1cee667a8c3bcf30c5fa1490f0b3d9c2
-
SSDEEP
6144:52ECIjjW+LuLIe0T1eXwp8bXk3X4G1cmL2Gp2eT:5FCIjjW6vTHcmLxAe
Malware Config
Extracted
redline
1
45.9.20.59:46287
-
auth_value
ec6ada170bcec2e72f0e1f3954547f73
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2324-3-0x0000000004430000-0x0000000004464000-memory.dmp family_redline behavioral1/memory/2324-4-0x00000000044C0000-0x00000000044F2000-memory.dmp family_redline behavioral1/memory/2324-23-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-25-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-21-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-19-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-17-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-15-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-13-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-11-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-9-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-7-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-6-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-27-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-29-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-37-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-35-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-33-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-31-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-39-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-41-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-43-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-53-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-51-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-49-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-47-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-45-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-55-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-63-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-61-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-59-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-57-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-69-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-67-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline behavioral1/memory/2324-65-0x00000000044C0000-0x00000000044EC000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665.exe"C:\Users\Admin\AppData\Local\Temp\c09223118b2ea6dafe560930b4d6baf96c9704f5b5718a3304743706a4a8e665.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2324