Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
6938624d6d7d3dac9d91a84e2553f2e38c3021cfa24043e248d081b76bc64148.exe
Resource
win7-20240903-en
General
-
Target
6938624d6d7d3dac9d91a84e2553f2e38c3021cfa24043e248d081b76bc64148.exe
-
Size
320KB
-
MD5
b1f15187e00813da4f664ff4e8269d1d
-
SHA1
7a452e51276d3dae93d8a6fe839104a1f8cf171c
-
SHA256
6938624d6d7d3dac9d91a84e2553f2e38c3021cfa24043e248d081b76bc64148
-
SHA512
c536bdc0eb127b7726f074600600ba0eedf908d0b39a050ce3c2af66ce619b44ed479651a42ea53b528fae42ea803279fd71761f260d86d6aaf5a381566fc3a9
-
SSDEEP
6144:0mPLCq4Tj46AblwyQgHvtQGCjxz5JHDAjP:1L+TeTtQ/SP
Malware Config
Extracted
redline
PUB
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2756-4-0x0000000001DE0000-0x0000000001E06000-memory.dmp family_redline behavioral1/memory/2756-5-0x0000000001F90000-0x0000000001FB4000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2756-4-0x0000000001DE0000-0x0000000001E06000-memory.dmp family_sectoprat behavioral1/memory/2756-5-0x0000000001F90000-0x0000000001FB4000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6938624d6d7d3dac9d91a84e2553f2e38c3021cfa24043e248d081b76bc64148.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6938624d6d7d3dac9d91a84e2553f2e38c3021cfa24043e248d081b76bc64148.exe