Analysis
-
max time kernel
111s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0.exe
Resource
win10v2004-20241007-en
General
-
Target
eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0.exe
-
Size
473KB
-
MD5
163abc8c31ebe9888a6c7a616f579b7b
-
SHA1
6fa7b9ab9f0633eec7ba30c5cf688dc2dfa3c879
-
SHA256
eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0
-
SHA512
3eae2470d720ebaa60fb466793a33c2dc093fd2cb96c27bd205bc87ebd0381b52222c58c0fd4e0352b94130d22123d28df5ec1368dca98c21f07e67eba310026
-
SSDEEP
12288:rm8Wu1doBhqUymktbliMH56RN7lvA8OEPP:rR11doHymktbli+6RRnlP
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/5100-5-0x0000000002770000-0x00000000027AC000-memory.dmp family_redline behavioral2/memory/5100-7-0x0000000004FB0000-0x0000000004FEA000-memory.dmp family_redline behavioral2/memory/5100-27-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-71-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-69-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-67-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-65-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-63-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-61-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-59-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-57-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-55-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-51-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-49-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-47-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-45-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-43-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-41-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-39-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-37-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-35-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-33-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-31-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-29-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-25-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-23-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-21-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-19-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-17-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-53-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-15-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-13-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-11-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-9-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline behavioral2/memory/5100-8-0x0000000004FB0000-0x0000000004FE5000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5100 eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0.exe"C:\Users\Admin\AppData\Local\Temp\eb2e74ae0d4472170bd48963a06737985c6e7177bb6484d04eda7c7ffc1c20d0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5100