Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-11-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
6a7a039915680faeaed2649ceb4f8249a6c51e2c52d1ff4cb1d0f0bf58433a21.exe
Resource
win7-20240903-en
General
-
Target
6a7a039915680faeaed2649ceb4f8249a6c51e2c52d1ff4cb1d0f0bf58433a21.exe
-
Size
396KB
-
MD5
91393b666e8d631e848fa2339e0d4994
-
SHA1
bf087ce1e59a06b6e3168d2d05cd006e2baa44aa
-
SHA256
6a7a039915680faeaed2649ceb4f8249a6c51e2c52d1ff4cb1d0f0bf58433a21
-
SHA512
f6f66ea83fb25fc16e33d5c24645d10e62754ce6c53df4e336fb2d646b976536cffb518b124016c64b6299ded16de655d2092fb2d72a6c0af1fa903ac434af0b
-
SSDEEP
6144:jYXXiMFsORMIYpomSwlxCEjMmfTpUB76J7Ny34j864CF1/:GXfFrRMjomxltjTtUBo7Ny3Mn
Malware Config
Extracted
redline
UTS
45.9.20.20:13441
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/2100-5-0x0000000003320000-0x0000000003346000-memory.dmp family_redline behavioral1/memory/2100-6-0x00000000059F0000-0x0000000005A14000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/2100-5-0x0000000003320000-0x0000000003346000-memory.dmp family_sectoprat behavioral1/memory/2100-6-0x00000000059F0000-0x0000000005A14000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a7a039915680faeaed2649ceb4f8249a6c51e2c52d1ff4cb1d0f0bf58433a21.exe