Analysis
-
max time kernel
111s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2024 11:37
Static task
static1
Behavioral task
behavioral1
Sample
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
Resource
win10v2004-20241007-en
General
-
Target
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
-
Size
283KB
-
MD5
3c2193c96c96d2fdb8bdc66572570a97
-
SHA1
299788a0de1de911c6d0b5e8e53c1b0f455375c9
-
SHA256
ae5227335fd1990a38cb49724b3b7fc827f47821b510bc9321d923523a6523fa
-
SHA512
b8484f9f21dc67baaf1dfdba1d4893fb17241d2587e8cbb3df5887065e345e34865b9aabe49d60068ac98333cde81f0a1d7769ac2e9afb27800ab5e5de514a6e
-
SSDEEP
6144:tAqeSy/2ab7xogtr1wYk4+zccfoNMZcuVHNmapbhXJE:tAqeSD8ftRhkHIJyjR4
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral2/memory/2540-5-0x0000000004B70000-0x0000000004BB6000-memory.dmp family_redline behavioral2/memory/2540-7-0x0000000004C30000-0x0000000004C74000-memory.dmp family_redline behavioral2/memory/2540-13-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-71-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-70-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-67-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-65-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-63-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-61-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-60-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-57-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-55-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-53-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-51-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-50-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-47-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-45-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-43-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-41-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-40-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-37-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-36-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-33-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-31-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-29-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-28-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-25-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-23-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-21-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-19-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-17-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-15-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-11-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-9-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline behavioral2/memory/2540-8-0x0000000004C30000-0x0000000004C6E000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exedescription pid Process Token: SeDebugPrivilege 2540 692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe"C:\Users\Admin\AppData\Local\Temp\692a10a7163ba45a9a3d3af577b19d4114747d427a4b4c9ebf8ec78c6d8720c8N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2540