Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 13:18
Static task
static1
Behavioral task
behavioral1
Sample
e162c336769fb894b76346cb71d0e2db53e76a53e8996d56b847593785bf6927.exe
Resource
win7-20241023-en
General
-
Target
e162c336769fb894b76346cb71d0e2db53e76a53e8996d56b847593785bf6927.exe
-
Size
345KB
-
MD5
201a3032f6f7aee93111f10a76b6a78d
-
SHA1
54b151fca2b5e14ff0ea68395dfd470f97885098
-
SHA256
e162c336769fb894b76346cb71d0e2db53e76a53e8996d56b847593785bf6927
-
SHA512
fe4ac3a849dda34b1b75d1074663d2113837223d2e1447d90433d762bdf4ba36c5866ff41221cb403b8b1183e7c44a9cd75c2ea02dca65ead9bcc64950d2da3d
-
SSDEEP
6144:IgrfeeSsAckLVemgCtlH1zBha6r4lShpKjA8BtKEEcZt0RZU6pSv:X5SsAckL9vthrha61hpXgBCZnp
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4912-5-0x0000000002620000-0x0000000002646000-memory.dmp family_redline behavioral2/memory/4912-7-0x0000000005110000-0x0000000005134000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4912-5-0x0000000002620000-0x0000000002646000-memory.dmp family_sectoprat behavioral2/memory/4912-7-0x0000000005110000-0x0000000005134000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e162c336769fb894b76346cb71d0e2db53e76a53e8996d56b847593785bf6927.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e162c336769fb894b76346cb71d0e2db53e76a53e8996d56b847593785bf6927.exe