Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8.exe
Resource
win7-20240903-en
General
-
Target
b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8.exe
-
Size
337KB
-
MD5
14c5bcb9841835b9f24070e3892138c5
-
SHA1
e0c65c81f06c1f0ba383a3e1794cc51cc4ed8b5c
-
SHA256
b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8
-
SHA512
9ab879fede3e0f82912ba2a748a08acb68aba4f113070549b51278e22d3c533f3def865daa4d6624d084913faa62f0b244b1f224439e213516bcc6909d7fbc2a
-
SSDEEP
6144:FI6QtkDqYRt1IJTZPQVu9fX9APeAye6dvFFdIADG8el:FxQtkD9yTZPQVYf2mFdxD
Malware Config
Extracted
redline
UTS
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1720-3-0x0000000004E10000-0x0000000004E34000-memory.dmp family_redline behavioral2/memory/1720-5-0x00000000074E0000-0x0000000007502000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1720-3-0x0000000004E10000-0x0000000004E34000-memory.dmp family_sectoprat behavioral2/memory/1720-5-0x00000000074E0000-0x0000000007502000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b86c7a13748a6fc24dc01212e9f47c81fc421077dd89b307ae977bd7285ae5f8.exe