Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09/11/2024, 19:04
Static task
static1
Behavioral task
behavioral1
Sample
5c98a38ae6d31624a50db1d7ed044ec0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5c98a38ae6d31624a50db1d7ed044ec0.exe
Resource
win10v2004-20241007-en
General
-
Target
5c98a38ae6d31624a50db1d7ed044ec0.exe
-
Size
407KB
-
MD5
5c98a38ae6d31624a50db1d7ed044ec0
-
SHA1
f3545f43e0cf12cfebbf8470ef44b649e8ddb18b
-
SHA256
3714795e57a451c7d9376c3bfd954b53b06290de5c9b8e2db12def69ddb50f08
-
SHA512
347a990920a949316d3ac2dcc55d9d5c61683678dcf51c3fd12e0c05e9eb35cc65dca15801a7e85917b546c78daba95b54c35bb118133da46ed5dcf738bd96f9
-
SSDEEP
12288:rqDCbIve8vq9ihEey8J4S2VdUirwRJ5t2:rB8vqUES6dUEuJ5t
Malware Config
Extracted
redline
ww
193.106.191.67:44400
-
auth_value
5a1b28ccd05953f5c3f99729c12427cc
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1736-70-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-68-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-66-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-64-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-62-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-60-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-58-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-56-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-54-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-50-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-48-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-44-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-42-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-40-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-38-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-36-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-34-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-32-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-30-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-28-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-26-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-24-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-22-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-18-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-16-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-14-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-12-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-52-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-10-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-47-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-8-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-20-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-7-0x0000000001FC0000-0x0000000001FED000-memory.dmp family_redline behavioral1/memory/1736-6-0x0000000001FC0000-0x0000000001FF2000-memory.dmp family_redline behavioral1/memory/1736-5-0x0000000001F40000-0x0000000001F74000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c98a38ae6d31624a50db1d7ed044ec0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1736 5c98a38ae6d31624a50db1d7ed044ec0.exe