Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:52
Behavioral task
behavioral1
Sample
6f3a866e36c93f92c93a2837042479d0.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6f3a866e36c93f92c93a2837042479d0.exe
Resource
win10v2004-20241007-en
General
-
Target
6f3a866e36c93f92c93a2837042479d0.exe
-
Size
364KB
-
MD5
6f3a866e36c93f92c93a2837042479d0
-
SHA1
9ad7c108d55f0d8a201cce3ae917e5f9efb463bb
-
SHA256
89c363fe87941bef43e0a4b393c9f6437c4732101a2aedb43756c24e33e03c15
-
SHA512
5027a428d91a4c8e6db69a816c5663fda406b03aa349f356a50d785ed7be71c96c054a7f0b77b8245b8729df601d239ab3d4b3e33e206c3453fd3e226a448e98
-
SSDEEP
6144:eEaXBUcN2BRrn1fH0N6GkBut5adsSEK69yDPhSjYlakxjTLVqoARRSTZAPdg+:/aRDNoVJKRtUdsSEK69yDPhSjYlakxjv
Malware Config
Extracted
redline
0002
13.72.81.58:13413
-
auth_value
866ce0ed8cfe2be77fb43a4912677698
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1524-1-0x0000000000280000-0x00000000002E0000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6f3a866e36c93f92c93a2837042479d0.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f3a866e36c93f92c93a2837042479d0.exe