Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
280f3075c68429371c11e9d8f133bcf18090125f8d10903ac28106c2f718d38b.exe
Resource
win7-20240903-en
General
-
Target
280f3075c68429371c11e9d8f133bcf18090125f8d10903ac28106c2f718d38b.exe
-
Size
239KB
-
MD5
ebf85cd67a544068a29537a612dfe596
-
SHA1
b444ac59e32d1c381169c014d8c24635e3965643
-
SHA256
280f3075c68429371c11e9d8f133bcf18090125f8d10903ac28106c2f718d38b
-
SHA512
7f99eb6e2a018f3f3db124e36729e37d2ccc27294fa2ff2eeb06bb8b35f56c06e0dbf646ea3e10a045d253261bbd8f72b08507c58953c1984219cd0be6ef107c
-
SSDEEP
3072:qBPv9iFPp+pojjuFSSa+AM9vgb0yo6IaTVVbmkKi/QfB8c7d9njknT5Un0O:q1uB4K4TvDNgwyotIbtKi/QZQjO
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2860-6-0x0000000001DD0000-0x0000000001DF4000-memory.dmp family_redline behavioral1/memory/2860-5-0x00000000003D0000-0x00000000003F6000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2860-6-0x0000000001DD0000-0x0000000001DF4000-memory.dmp family_sectoprat behavioral1/memory/2860-5-0x00000000003D0000-0x00000000003F6000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
280f3075c68429371c11e9d8f133bcf18090125f8d10903ac28106c2f718d38b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 280f3075c68429371c11e9d8f133bcf18090125f8d10903ac28106c2f718d38b.exe