Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
a24cfd1243fd55f43765deea2db86c4a9fa99d25d4ee9a25ee34e6ad083591b1.exe
Resource
win7-20240903-en
General
-
Target
a24cfd1243fd55f43765deea2db86c4a9fa99d25d4ee9a25ee34e6ad083591b1.exe
-
Size
291KB
-
MD5
290e705d85553aad965b645de1849ad5
-
SHA1
965a033770c40cb88e301e55f991750dfa2c7674
-
SHA256
a24cfd1243fd55f43765deea2db86c4a9fa99d25d4ee9a25ee34e6ad083591b1
-
SHA512
8af9f6d2ae3e14d519a15f59e5eeb2a0fcb8012c1ded46ce563dbd3499e580cc208e99f788fa679167c467a4e8fde4cd8acd862a4b31fc4908c4d6527650f7bc
-
SSDEEP
3072:BV75VLcdtSwcF/7NHs3we1RG4IWTK/Jt1gpfmwViXp0yCaMhTf53TOQsWvqmCIYj:hVLmSnFjNHqwmRG2Kxt6pPViayCZh7V
Malware Config
Extracted
redline
UTS
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3668-4-0x0000000004000000-0x0000000004026000-memory.dmp family_redline behavioral2/memory/3668-6-0x0000000004170000-0x0000000004194000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3668-4-0x0000000004000000-0x0000000004026000-memory.dmp family_sectoprat behavioral2/memory/3668-6-0x0000000004170000-0x0000000004194000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a24cfd1243fd55f43765deea2db86c4a9fa99d25d4ee9a25ee34e6ad083591b1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a24cfd1243fd55f43765deea2db86c4a9fa99d25d4ee9a25ee34e6ad083591b1.exe