Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e.exe
Resource
win7-20240903-en
General
-
Target
d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e.exe
-
Size
284KB
-
MD5
455c470e44de7a9f8ca84f08fd718eac
-
SHA1
0fe221ceb67f509097650ea6d15f3a53bc049985
-
SHA256
d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e
-
SHA512
e2de6be2d7dad6c17c273fd596d0717c411f4e16dce15eeac2c7e4436fad53dc20f897a1c68eadcc01a4994a21f16640f1b927ad678dce5ca9ee00fa553abbf8
-
SSDEEP
6144:linf0s4oGOLAFprzQF5F/XJ81urcPI1rKuSzC:knf0s4oGOcFpoN/XJZ4I1rmC
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1392-5-0x0000000000460000-0x0000000000486000-memory.dmp family_redline behavioral1/memory/1392-6-0x0000000001F90000-0x0000000001FB4000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1392-5-0x0000000000460000-0x0000000000486000-memory.dmp family_sectoprat behavioral1/memory/1392-6-0x0000000001F90000-0x0000000001FB4000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8587eb6bd277fbc7d256c67bc4ad3c9cb09a47a23e75d388a7db348264d552e.exe