Analysis
-
max time kernel
110s -
max time network
116s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
Resource
win10v2004-20241007-en
General
-
Target
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
-
Size
283KB
-
MD5
3c2193c96c96d2fdb8bdc66572570a97
-
SHA1
299788a0de1de911c6d0b5e8e53c1b0f455375c9
-
SHA256
ae5227335fd1990a38cb49724b3b7fc827f47821b510bc9321d923523a6523fa
-
SHA512
b8484f9f21dc67baaf1dfdba1d4893fb17241d2587e8cbb3df5887065e345e34865b9aabe49d60068ac98333cde81f0a1d7769ac2e9afb27800ab5e5de514a6e
-
SSDEEP
6144:tAqeSy/2ab7xogtr1wYk4+zccfoNMZcuVHNmapbhXJE:tAqeSD8ftRhkHIJyjR4
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-5-0x0000000004800000-0x0000000004846000-memory.dmp family_redline behavioral1/memory/2084-6-0x0000000004840000-0x0000000004884000-memory.dmp family_redline behavioral1/memory/2084-8-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-7-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-10-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-20-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-54-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-70-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-68-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-66-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-64-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-62-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-60-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-58-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-56-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-52-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-50-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-48-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-46-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-44-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-42-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-40-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-38-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-36-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-34-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-32-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-30-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-28-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-26-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-24-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-22-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-18-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-16-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-14-0x0000000004840000-0x000000000487E000-memory.dmp family_redline behavioral1/memory/2084-12-0x0000000004840000-0x000000000487E000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exedescription pid Process Token: SeDebugPrivilege 2084 692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe"C:\Users\Admin\AppData\Local\Temp\692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084