Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2024, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
f3d4b1cac9d6c6581e11e6d3cf6bce1ebddb1589dc77435f6298db067cd90444.exe
Resource
win7-20240903-en
General
-
Target
f3d4b1cac9d6c6581e11e6d3cf6bce1ebddb1589dc77435f6298db067cd90444.exe
-
Size
313KB
-
MD5
0a02da37a77e6c0e1dafcbb3afcbd117
-
SHA1
52eebea8a731064a86dcb259e261077659a2665b
-
SHA256
f3d4b1cac9d6c6581e11e6d3cf6bce1ebddb1589dc77435f6298db067cd90444
-
SHA512
5283e80e0df8a997ec0603e0310e5059357308855e69f90055ce510b6e340805563e8d8bc5e0bbb029409bd948837664ac9cb995c1909823502c19bb15875192
-
SSDEEP
6144:7GZQNdJLiTp74SmU3UI6rzJGbc3PSpXjTyfNHyuAx3XLW0ZE:6Z1Tp74SAI6/JGWfgu0Xa0K
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/3652-5-0x00000000021F0000-0x0000000002216000-memory.dmp family_redline behavioral2/memory/3652-7-0x0000000004A00000-0x0000000004A24000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/3652-5-0x00000000021F0000-0x0000000002216000-memory.dmp family_sectoprat behavioral2/memory/3652-7-0x0000000004A00000-0x0000000004A24000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3d4b1cac9d6c6581e11e6d3cf6bce1ebddb1589dc77435f6298db067cd90444.exe