Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d.exe
Resource
win10v2004-20241007-en
General
-
Target
69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d.exe
-
Size
297KB
-
MD5
7b6fc2f7ae62643bbcde07967c861549
-
SHA1
f441fd6e5df6469d350b4dfdabf8e93d54ad758b
-
SHA256
69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d
-
SHA512
3ab53bb6558fcc5c6f2d52dfbc0ba16b07cc1bdf80aa234bd887410ee3e828ae1b0e0debab7af53ca4811ca10b3c985252e9068b11d262ee3957e3659a699b0c
-
SSDEEP
6144:bHX+iXvoPGKN3MYAXcK6YWo2mYLVe2PRy6u802JJs:b3+iXvoPoYISTLVHZy6zJ
Malware Config
Extracted
redline
1
45.9.20.59:46287
-
auth_value
ec6ada170bcec2e72f0e1f3954547f73
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/2964-3-0x0000000004BA0000-0x0000000004BD4000-memory.dmp family_redline behavioral2/memory/2964-5-0x00000000072D0000-0x0000000007302000-memory.dmp family_redline behavioral2/memory/2964-7-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-14-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-70-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-68-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-64-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-62-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-60-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-58-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-56-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-54-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-52-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-50-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-48-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-46-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-42-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-40-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-39-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-34-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-32-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-30-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-28-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-26-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-24-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-20-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-18-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-16-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-12-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-10-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-8-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-66-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-44-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-36-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline behavioral2/memory/2964-22-0x00000000072D0000-0x00000000072FC000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2964 69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d.exe"C:\Users\Admin\AppData\Local\Temp\69c6f2bb8e748e01c03f2f5dd17b678ab0ae7788f4fa53aabb051d87061e458d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2964