Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 16:02
Static task
static1
Behavioral task
behavioral1
Sample
7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4.exe
Resource
win7-20241010-en
General
-
Target
7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4.exe
-
Size
412KB
-
MD5
420edbfe29dc6a09324fc103f84fac2a
-
SHA1
f36a5cd26dd3d40006de7773fc6a0736650589a4
-
SHA256
7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4
-
SHA512
9f88f97f73786bc172f2e1eea9d4ccc5e6d25c5f52fcccdf069a56fbc9e405d6910fb61e2acb7cf17eb682c66285fcd54bafefe65959bf409df7b39dd89ea92d
-
SSDEEP
12288:ujbmZvqx+PI5YrAIq7z5UUrpesBBIDov:Fsxdm0IuUqesN
Malware Config
Extracted
redline
money
45.142.215.47:27643
-
auth_value
9491a1c5e11eb6097e68a4fa8627fda8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2180-4-0x0000000003240000-0x0000000003264000-memory.dmp family_redline behavioral1/memory/2180-6-0x0000000003290000-0x00000000032B2000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2180-4-0x0000000003240000-0x0000000003264000-memory.dmp family_sectoprat behavioral1/memory/2180-6-0x0000000003290000-0x00000000032B2000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7578cbbfe4b1dd5207e6aef6e3c35c2474c940df35623326b6527d2d5d506bd4.exe