Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c.exe
Resource
win10v2004-20241007-en
General
-
Target
767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c.exe
-
Size
383KB
-
MD5
a0da4ecb3e09b4ec4bcf7449cfce49d8
-
SHA1
7430ef1b1f7312ec92a98f5d90b92f6002be2a92
-
SHA256
767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c
-
SHA512
03a8b36b8ffc62cf6515478f3486c2c864850276b143034dc4dc97c20afe61d82126de6d883f293219211829d77b3807a1707aa50954703afd1ab504f710c53d
-
SSDEEP
6144:ANaJ3TPjifAJdT1HhGB35wOx6irIvIG6PDdmXb7ITsqXigaXwVfZ:+eTbMAJdxsXx6Dv4dk7R
Malware Config
Extracted
redline
1
45.9.20.59:46287
-
auth_value
ec6ada170bcec2e72f0e1f3954547f73
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2668-3-0x0000000002C60000-0x0000000002C94000-memory.dmp family_redline behavioral1/memory/2668-4-0x0000000002F70000-0x0000000002FA2000-memory.dmp family_redline behavioral1/memory/2668-5-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-69-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-67-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-65-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-63-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-61-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-59-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-57-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-55-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-53-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-51-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-49-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-47-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-45-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-43-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-41-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-39-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-37-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-35-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-33-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-31-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-29-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-27-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-25-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-23-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-21-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-18-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-16-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-14-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-12-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-10-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-8-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline behavioral1/memory/2668-6-0x0000000002F70000-0x0000000002F9C000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2668 767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c.exe"C:\Users\Admin\AppData\Local\Temp\767d557e8d34d84c53543f01d633955567b5154303b4b16c53925353ebbfb85c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2668