Analysis
-
max time kernel
110s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 08:37
Static task
static1
Behavioral task
behavioral1
Sample
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
Resource
win10v2004-20241007-en
General
-
Target
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
-
Size
283KB
-
MD5
763f274162a628c1489f9b42b56ee2b5
-
SHA1
6081c16de228f11b4c9e1ab60add14aa33b3dc6d
-
SHA256
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9
-
SHA512
c7cfa3b9315096df9e5abef6bbf9d1b2ea6bcdaf05925c3b0f29d6cc33750df83c4fe411832acbaa81c757331eb3780d34556d8ee723e896e7353cb21764a115
-
SSDEEP
6144:C4MXuMjgb9SN4sm8GFbdlQQtecmqZmRvhKJL:C4MXSVMgls0WO
Malware Config
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral2/memory/3088-5-0x0000000002650000-0x0000000002696000-memory.dmp family_redline behavioral2/memory/3088-7-0x00000000027C0000-0x0000000002804000-memory.dmp family_redline behavioral2/memory/3088-69-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-71-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-67-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-65-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-63-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-61-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-59-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-57-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-55-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-53-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-51-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-49-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-47-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-45-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-43-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-41-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-39-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-37-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-35-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-31-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-29-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-27-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-25-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-23-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-21-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-19-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-17-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-15-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-13-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-11-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-9-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-8-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline behavioral2/memory/3088-33-0x00000000027C0000-0x00000000027FE000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exedescription pid Process Token: SeDebugPrivilege 3088 633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe"C:\Users\Admin\AppData\Local\Temp\633d29ae417e54e70038513944b1bc3e0e64f15e44ef418c5e8ec744f9aa89c9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3088