Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af.exe
Resource
win10v2004-20241007-en
General
-
Target
9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af.exe
-
Size
371KB
-
MD5
264b5fdb07495d9a4a7634a40cd89743
-
SHA1
6c7fb033b97d79c28b8eeae442a0a7b8562bb7d9
-
SHA256
9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af
-
SHA512
480b2f11cae9300476aedd64fe48e6a52f576d71705b3334d2e64bb0ccd71389772cc280777e08b173bd9266c844a474dbf7915b8e77995e305c4f10a120044a
-
SSDEEP
6144:I1c95HIATYxl4z3GTkAe0YnGDw2IKcO/w+XiILU6dqb7ITsqXigaXwVfi:I1c95H7TYrCYkAepCw2oOI4kL7R
Malware Config
Extracted
redline
1
45.9.20.59:46287
-
auth_value
ec6ada170bcec2e72f0e1f3954547f73
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/3416-3-0x0000000004BB0000-0x0000000004BE4000-memory.dmp family_redline behavioral2/memory/3416-5-0x0000000004F20000-0x0000000004F52000-memory.dmp family_redline behavioral2/memory/3416-54-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-36-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-70-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-68-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-67-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-64-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-62-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-60-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-58-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-56-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-52-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-50-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-48-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-46-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-44-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-42-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-40-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-38-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-34-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-32-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-30-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-28-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-26-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-24-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-22-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-20-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-18-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-16-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-14-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-12-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-8-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-10-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline behavioral2/memory/3416-7-0x0000000004F20000-0x0000000004F4C000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3416 9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af.exe"C:\Users\Admin\AppData\Local\Temp\9a20929176fe171dffc9444fc9794aa18f7a04a0876f7c90ae1b3023a5ce98af.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3416