Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
ba9d9affc318d057e8684c8d011d1277d9f43eca3944dad818a5a6a9405f3d63.exe
Resource
win7-20240903-en
General
-
Target
ba9d9affc318d057e8684c8d011d1277d9f43eca3944dad818a5a6a9405f3d63.exe
-
Size
408KB
-
MD5
b6a2ee1adc1c70332f0a2f08383e2859
-
SHA1
725937e2e92b5d80b1214a1cc71fd75695276af3
-
SHA256
ba9d9affc318d057e8684c8d011d1277d9f43eca3944dad818a5a6a9405f3d63
-
SHA512
2ee7a55a758ee105788631cd1d941408f894dfbb764f729956a6987025dabc3f07b3283fecae1b33d19d30ce1bc294d70f302de8da2c4bd222741aefc4c10ab9
-
SSDEEP
12288:jes4TcYYlC6sUxcAh4Cv4uh8qoAgF+okGk9qcIN:jeZkxxZhTLgQokhMcIN
Malware Config
Extracted
redline
PUB
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2096-5-0x0000000002530000-0x0000000002554000-memory.dmp family_redline behavioral1/memory/2096-6-0x0000000002700000-0x0000000002722000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2096-5-0x0000000002530000-0x0000000002554000-memory.dmp family_sectoprat behavioral1/memory/2096-6-0x0000000002700000-0x0000000002722000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba9d9affc318d057e8684c8d011d1277d9f43eca3944dad818a5a6a9405f3d63.exe