Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/11/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
9b4e792e32c17dbdb833bea4302bf4f6a594ca84b2fa3ee5bc0bef7c67e5ef50.exe
Resource
win7-20240729-en
General
-
Target
9b4e792e32c17dbdb833bea4302bf4f6a594ca84b2fa3ee5bc0bef7c67e5ef50.exe
-
Size
413KB
-
MD5
023e412b9b83e38acaf0c0555914fa97
-
SHA1
aff7e9c80411a7732ee251fdb3c6459243eee30c
-
SHA256
9b4e792e32c17dbdb833bea4302bf4f6a594ca84b2fa3ee5bc0bef7c67e5ef50
-
SHA512
107afac87ffd37ff48fdd482d21035a92365679e31bc489bec57f5fc3a764a8f4efb7c0497ebbb5288b1754a5ef7db119a28c6b7e495c332bd38f55c15e097e9
-
SSDEEP
6144:FV95Hf61Xxqhhqy9ubrxyRhr+ks2ombck0EDXba9Lqloi0KsFhZLE:vv6mrFkmgLEDLa9L5i0KsFj
Malware Config
Extracted
redline
money
45.142.215.47:27643
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2076-3-0x0000000003350000-0x0000000003374000-memory.dmp family_redline behavioral1/memory/2076-5-0x0000000003370000-0x0000000003392000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2076-3-0x0000000003350000-0x0000000003374000-memory.dmp family_sectoprat behavioral1/memory/2076-5-0x0000000003370000-0x0000000003392000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b4e792e32c17dbdb833bea4302bf4f6a594ca84b2fa3ee5bc0bef7c67e5ef50.exe