Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
480f9bedc8a95771da253c1360872a30.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
480f9bedc8a95771da253c1360872a30.exe
Resource
win10v2004-20241007-en
General
-
Target
480f9bedc8a95771da253c1360872a30.exe
-
Size
457KB
-
MD5
480f9bedc8a95771da253c1360872a30
-
SHA1
b0f90af6c8c363f0edff502e2b4fe9ee586e6842
-
SHA256
b7d1af3d4eed6d0652021d2d9b317519e21a9f15b470c8f06ebb73c5b813b268
-
SHA512
cb23f3a4e4371a1fbc97f291aa70ae46e6e3c1ffb3ec496cf624db9a7aec99a330478100cda93505ccaf7096248b75613ed295305b406897e9d5b5365de5d179
-
SSDEEP
6144:YscI2xoKoQQOEZtqLQyLFDabYnOlaZRKUh95x+O97ITsqYigavwVfG:YscFTQOE/qrebrlaZ4WxJ7u7
Malware Config
Extracted
redline
SEWPALPADIN
45.9.20.112:57175
-
auth_value
5690233e096f92772f1ad7a4afefede9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/4656-4-0x0000000002300000-0x0000000002334000-memory.dmp family_redline behavioral2/memory/4656-6-0x0000000002390000-0x00000000023C2000-memory.dmp family_redline behavioral2/memory/4656-38-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-14-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-8-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-7-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-71-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-68-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-67-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-64-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-62-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-60-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-58-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-56-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-54-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-52-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-50-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-48-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-46-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-44-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-42-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-40-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-36-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-34-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-32-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-30-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-28-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-26-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-24-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-22-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-20-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-18-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-16-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-12-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline behavioral2/memory/4656-10-0x0000000002390000-0x00000000023BD000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 480f9bedc8a95771da253c1360872a30.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4656 480f9bedc8a95771da253c1360872a30.exe