Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5.exe
Resource
win7-20241010-en
General
-
Target
a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5.exe
-
Size
413KB
-
MD5
2e24ad664c74f38e04bc8ea5bb217431
-
SHA1
229cf3fc7b8f0190de6e41e17cbfa2f24375b393
-
SHA256
a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5
-
SHA512
3d0f66ec8e675411b3a61aee56ce2053bb93ad399e164d3e55ba1a318f275a29981c61b737e7b903d94b94e916df50c5c9d60934745b5edeb27b417c19a733a7
-
SSDEEP
6144:lXQxT7RvFnif5QhFbbQnTUyUntk7rrPypaiLuOMFMhkduCn10vErY:lAxlAfK3HMTZGmXrP6aiLWFMhkd91g5
Malware Config
Extracted
redline
UDP
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/1568-4-0x0000000003600000-0x0000000003626000-memory.dmp family_redline behavioral2/memory/1568-7-0x0000000003650000-0x0000000003674000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/1568-4-0x0000000003600000-0x0000000003626000-memory.dmp family_sectoprat behavioral2/memory/1568-7-0x0000000003650000-0x0000000003674000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a868114ce7b9dfb1bdd0e0850dceeb51ca50262fdf2896347f3cb11bde7e57d5.exe