Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e.exe
Resource
win10v2004-20241007-en
General
-
Target
0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e.exe
-
Size
340KB
-
MD5
e40a2f9bcfa2971e25d5fb6c451161a4
-
SHA1
ac7afed56d44272b1d7ea921add0c8d007040330
-
SHA256
0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e
-
SHA512
1ac55dd4fb210a5911a64a3aac77113596b8cf44e8d1dbab69e373316ff1e01fb00f3806a1c6f3d632021ada8cfaf285d9e27f3d6ca74ec9d8ec0ddfdeeffb3d
-
SSDEEP
6144:byA320N/crsXARnrWTWVUer5v8TXiXuu2KCwH4r+j:byAmw/AsXA5u4Uw5vleu2KX
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/1976-4-0x0000000007260000-0x000000000729C000-memory.dmp family_redline behavioral2/memory/1976-6-0x00000000078D0000-0x000000000790A000-memory.dmp family_redline behavioral2/memory/1976-9-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-11-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-69-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-71-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-67-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-65-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-63-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-61-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-59-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-57-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-53-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-51-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-49-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-47-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-45-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-43-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-41-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-39-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-37-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-35-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-33-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-31-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-29-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-27-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-25-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-23-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-21-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-19-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-17-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-15-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-13-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-8-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline behavioral2/memory/1976-55-0x00000000078D0000-0x0000000007905000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e.exe"C:\Users\Admin\AppData\Local\Temp\0fba69d9c7aecac05ea42ed2c1c7968449372a617586af1372662e1dfcdd102e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1976