Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exe
Resource
win10v2004-20241007-en
General
-
Target
1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exe
-
Size
409KB
-
MD5
2a370a0ef832c6becb74e6eeb0d1082c
-
SHA1
64c765ba474f978b541ae94e5cd1f3a9485b039a
-
SHA256
1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc
-
SHA512
625f2c7ec9f0e332ffe6ae911a608616b14073af911bf399f3ee7c90a79d81dfd054c53aee6d9ba34f31bb2346141fd47fb44b1551a3b886237e4b6fbfb67b44
-
SSDEEP
6144:/xKLAQYhhtWD1WCQTEWRanO81sHwhGGF1WTxbcvgm0YEHMDrPnR:/sUQccQD7qhGSmxbXXH8rP
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2500-4-0x0000000004520000-0x0000000004566000-memory.dmp family_redline behavioral1/memory/2500-5-0x0000000004760000-0x00000000047A4000-memory.dmp family_redline behavioral1/memory/2500-8-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-32-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-46-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-70-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-68-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-66-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-64-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-62-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-60-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-58-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-56-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-54-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-52-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-50-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-48-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-44-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-42-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-40-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-38-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-36-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-34-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-30-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-28-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-26-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-24-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-22-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-20-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-18-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-16-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-14-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-12-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-10-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/2500-7-0x0000000004760000-0x000000000479E000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exedescription pid process Token: SeDebugPrivilege 2500 1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exe"C:\Users\Admin\AppData\Local\Temp\1fe95c6c9c8d4f325f11bf4d3f43add34fe132717c0cf9f01336aa37e29e42cc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2500