Analysis

  • max time kernel
    110s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 02:48

General

  • Target

    3a51485d649cac9471bf0b053ff9d97646323db46c897d95fa5753d7f9a7dd3c.exe

  • Size

    488KB

  • MD5

    3b467a234d6639000bd2c08a26d176f8

  • SHA1

    0f8d8a04cb40ddfb730a0fb706f48a84548e06f1

  • SHA256

    3a51485d649cac9471bf0b053ff9d97646323db46c897d95fa5753d7f9a7dd3c

  • SHA512

    9dbc5ce19031b5eaa70df97b697185449838aa0e692ac645d2c9054cb1885f1397d49602510f042275f10e76d29cfc3de59b2ac3efcb8cef2ead60ebcbe679f1

  • SSDEEP

    12288:hd4C6Xz7in8RTHFwmq9uYPiuMR9x6Tllb:huCL8Rr+B4YKuQ9ITDb

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Redline family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a51485d649cac9471bf0b053ff9d97646323db46c897d95fa5753d7f9a7dd3c.exe
    "C:\Users\Admin\AppData\Local\Temp\3a51485d649cac9471bf0b053ff9d97646323db46c897d95fa5753d7f9a7dd3c.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1548-1-0x00000000009A0000-0x0000000000AA0000-memory.dmp

    Filesize

    1024KB

  • memory/1548-3-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/1548-2-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/1548-4-0x0000000000400000-0x000000000081E000-memory.dmp

    Filesize

    4.1MB

  • memory/1548-5-0x0000000002440000-0x000000000247C000-memory.dmp

    Filesize

    240KB

  • memory/1548-6-0x0000000004B20000-0x0000000004B5A000-memory.dmp

    Filesize

    232KB

  • memory/1548-7-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-8-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-10-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-46-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-12-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-68-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-14-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-16-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-18-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-20-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-22-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-24-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-26-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-28-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-30-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-32-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-34-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-36-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-38-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-42-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-50-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-60-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-70-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-66-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-64-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-62-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-58-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-56-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-54-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-52-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-48-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-44-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-40-0x0000000004B20000-0x0000000004B55000-memory.dmp

    Filesize

    212KB

  • memory/1548-799-0x00000000009A0000-0x0000000000AA0000-memory.dmp

    Filesize

    1024KB

  • memory/1548-800-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB