Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2024, 15:24
Static task
static1
Behavioral task
behavioral1
Sample
2876c6d4ee60a20ab9f46116a0b0ba72d806d982be0fa53b0299205ef6d8e538.exe
Resource
win7-20241010-en
General
-
Target
2876c6d4ee60a20ab9f46116a0b0ba72d806d982be0fa53b0299205ef6d8e538.exe
-
Size
290KB
-
MD5
043c9b4a591f38453cf5e394ae217d05
-
SHA1
7d3b6d82f88b4478992ebfaba16edd16f8bc4e2c
-
SHA256
2876c6d4ee60a20ab9f46116a0b0ba72d806d982be0fa53b0299205ef6d8e538
-
SHA512
13b64ce30051475717680fb98499f7b52ebc176c0970862d6f254109ef3e50707f9c75388c37028420ab3292eaed7fff1f811dbb72b275cd4eacc5befb26c828
-
SSDEEP
6144:SnTZvL7SH5BSmL3ORhN98ssI/KWAwDAX9WnuizqPT/oJYn:stfSH5BSmL3ORhNGsPfzDAZi+Ps
Malware Config
Extracted
redline
185.215.113.29:8678
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/2376-4-0x00000000041C0000-0x00000000041E4000-memory.dmp family_redline behavioral2/memory/2376-6-0x00000000042F0000-0x0000000004312000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/2376-4-0x00000000041C0000-0x00000000041E4000-memory.dmp family_sectoprat behavioral2/memory/2376-6-0x00000000042F0000-0x0000000004312000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2876c6d4ee60a20ab9f46116a0b0ba72d806d982be0fa53b0299205ef6d8e538.exe