Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/11/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
e113a052ffb29d661a71eed9475d77b1a4623e11f343198f664924158fa3aad8.exe
Resource
win7-20240903-en
General
-
Target
e113a052ffb29d661a71eed9475d77b1a4623e11f343198f664924158fa3aad8.exe
-
Size
240KB
-
MD5
b8c61314c24df62617c376202f785091
-
SHA1
64c0b6d100e076c3ea6f200e4b07722e05fc121c
-
SHA256
e113a052ffb29d661a71eed9475d77b1a4623e11f343198f664924158fa3aad8
-
SHA512
8aa96ac54e0d3cd04fcd07faf1f82e9b9cfe1004a6c84b1288ceb9d0e8831c8592179cca20242f962a128977c3ca1fb2d9450f328e2b2bea7a53e54948b39632
-
SSDEEP
3072:jBPv9cnFZh2w8utUtNiXqR2WTEwVEc3cmVENLwAAnyj8pU57GyLxJ40O:j14FZh2Pugsa5EEvsLwyj8ByN9O
Malware Config
Extracted
redline
UDP
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2388-5-0x0000000001CC0000-0x0000000001CE6000-memory.dmp family_redline behavioral1/memory/2388-6-0x0000000002170000-0x0000000002194000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2388-5-0x0000000001CC0000-0x0000000001CE6000-memory.dmp family_sectoprat behavioral1/memory/2388-6-0x0000000002170000-0x0000000002194000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e113a052ffb29d661a71eed9475d77b1a4623e11f343198f664924158fa3aad8.exe