Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/11/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964.exe
Resource
win10v2004-20241007-en
General
-
Target
5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964.exe
-
Size
325KB
-
MD5
07e1895ee69adfb1a39d4f774fe9ec12
-
SHA1
09486f8af40252ce3b89f544e46e4325400a647d
-
SHA256
5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964
-
SHA512
4f590a63dc833df60ce8e303f3f2ae2c38af4c1bbdcb4a3c50ac47b703365097012cbf35a3f082f7b15135657393e32eb15c8b16d441c4f2c084f9649edb760a
-
SSDEEP
6144:4kQuOSvy0tyg9E4rCRf9DX6E0ZYYIvNyEm8N:49uOSvy+RC+EOxIvgEm
Malware Config
Extracted
redline
TripleSBanks
185.143.223.90:10024
-
auth_value
064872fe393e6f3a6d60eca59269d528
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2428-5-0x00000000026C0000-0x00000000026FC000-memory.dmp family_redline behavioral1/memory/2428-6-0x0000000002700000-0x000000000273A000-memory.dmp family_redline behavioral1/memory/2428-7-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-8-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-10-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-12-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-14-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-32-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-38-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-64-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-70-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-68-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-66-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-62-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-60-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-58-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-56-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-54-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-52-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-50-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-48-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-46-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-44-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-42-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-40-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-36-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-34-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-30-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-28-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-26-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-24-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-22-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-20-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-18-0x0000000002700000-0x0000000002734000-memory.dmp family_redline behavioral1/memory/2428-16-0x0000000002700000-0x0000000002734000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2428 5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964.exe"C:\Users\Admin\AppData\Local\Temp\5b467453989ec7d8ad1457d12408911ab5b79beb6551fef78abe4ab84be7d964.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428