Analysis
-
max time kernel
111s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
Resource
win10v2004-20241007-en
General
-
Target
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
-
Size
283KB
-
MD5
763f274162a628c1489f9b42b56ee2b5
-
SHA1
6081c16de228f11b4c9e1ab60add14aa33b3dc6d
-
SHA256
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9
-
SHA512
c7cfa3b9315096df9e5abef6bbf9d1b2ea6bcdaf05925c3b0f29d6cc33750df83c4fe411832acbaa81c757331eb3780d34556d8ee723e896e7353cb21764a115
-
SSDEEP
6144:C4MXuMjgb9SN4sm8GFbdlQQtecmqZmRvhKJL:C4MXSVMgls0WO
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1852-5-0x0000000002180000-0x00000000021C6000-memory.dmp family_redline behavioral1/memory/1852-6-0x0000000002330000-0x0000000002374000-memory.dmp family_redline behavioral1/memory/1852-7-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-8-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-18-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-10-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-12-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-30-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-14-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-24-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-34-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-32-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-38-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-36-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-28-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-26-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-22-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-20-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-16-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-50-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-40-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-42-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-56-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-71-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-68-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-66-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-64-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-62-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-60-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-58-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-54-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-52-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-48-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-46-0x0000000002330000-0x000000000236E000-memory.dmp family_redline behavioral1/memory/1852-44-0x0000000002330000-0x000000000236E000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exedescription pid Process Token: SeDebugPrivilege 1852 633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe"C:\Users\Admin\AppData\Local\Temp\633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1852