Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411.exe
Resource
win7-20240903-en
General
-
Target
260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411.exe
-
Size
361KB
-
MD5
88b8c7ff3204bca8a6c79a80c70c4b24
-
SHA1
223e25a9a64072e2f966858fc72d487099601a5c
-
SHA256
260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411
-
SHA512
f60910b86f3636b62c88997043249b83d221a663a52d0db8eb3f93a956613f9e95204d77d99e90f849afdf907535f590147b2598740eb0cf0d379a52fc87fb03
-
SSDEEP
6144:yy+aJYjiVliCG/dns27iO5rW3dzHZ4vWvIxdo:yy+aWjiVlw/Os7pW3dbmO
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-3-0x0000000002C70000-0x0000000002C96000-memory.dmp family_redline behavioral1/memory/2296-4-0x0000000002CA0000-0x0000000002CC4000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-3-0x0000000002C70000-0x0000000002C96000-memory.dmp family_sectoprat behavioral1/memory/2296-4-0x0000000002CA0000-0x0000000002CC4000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 260f84f7b0a5d0af5a35124d643a35576cb92fac28a22f9d21f89b8f55d86411.exe