Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
861587d63b62c03d49cfe50a783abd5c8b06b0cc470bf0f5316bda799360cb40.exe
Resource
win7-20240903-en
General
-
Target
861587d63b62c03d49cfe50a783abd5c8b06b0cc470bf0f5316bda799360cb40.exe
-
Size
384KB
-
MD5
2c6b0d568a60a6157ea9511ede82c0b8
-
SHA1
4facac67dd24177426a90299ebecef5db6e1c5cd
-
SHA256
861587d63b62c03d49cfe50a783abd5c8b06b0cc470bf0f5316bda799360cb40
-
SHA512
40ecf7f04ca5aa16e3d8b56d71506089c69fb9b8922f39837bf36529637063b94d6f302d80aeefcec635c39efd297b5ff65637d36d7b9d87c0cbb1439c109a4d
-
SSDEEP
6144:X2TZ8kYRUluLh4QgJYNFgphjNJz7vO/Dng+bSwUwhNpw8DLnOkt:G8RReuOQgwgjjXz7G7ng+vdhNe2h
Malware Config
Extracted
redline
usamoney
45.142.215.47:27643
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2136-4-0x0000000003310000-0x0000000003334000-memory.dmp family_redline behavioral1/memory/2136-5-0x0000000005940000-0x0000000005962000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2136-4-0x0000000003310000-0x0000000003334000-memory.dmp family_sectoprat behavioral1/memory/2136-5-0x0000000005940000-0x0000000005962000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
861587d63b62c03d49cfe50a783abd5c8b06b0cc470bf0f5316bda799360cb40.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 861587d63b62c03d49cfe50a783abd5c8b06b0cc470bf0f5316bda799360cb40.exe