Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/11/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99eN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99eN.exe
Resource
win10v2004-20241007-en
General
-
Target
530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99eN.exe
-
Size
345KB
-
MD5
a08ecead1e969ef6c97e78b0bfe22770
-
SHA1
98d1c4aa25e730413cfe6b2f134645fa8bfdcc49
-
SHA256
530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99e
-
SHA512
5121369036801dc6c6f7b473e09773584cb20f5288dbe683f8e602b5e28dbb0e1a2069300c1cd9c1f106d07f3246c356e4774d75c153eaab38832d680daf80ad
-
SSDEEP
6144:1iuo+rLcXfNbdX5AoKpelCoQqDmJLIGv7XpCd3bM/zDig02TpgBsDiYn:1iuTrYXfNb5yoKH2mJ/v70rOfigLKe
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2796-4-0x00000000033F0000-0x0000000003436000-memory.dmp family_redline behavioral1/memory/2796-6-0x0000000003680000-0x00000000036C4000-memory.dmp family_redline behavioral1/memory/2796-8-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-10-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-14-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-16-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-12-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-7-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-30-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-46-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-56-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-68-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-18-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-22-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-28-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-32-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-36-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-42-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-48-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-60-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-70-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-66-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-64-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-62-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-58-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-54-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-52-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-50-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-44-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-40-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-38-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-34-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-26-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-24-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline behavioral1/memory/2796-21-0x0000000003680000-0x00000000036BF000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99eN.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99eN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99eN.exe"C:\Users\Admin\AppData\Local\Temp\530371011ff7d6895e026c6be7ba325233d1099908446aaeaaad75a254dfc99eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2796