Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exe
Resource
win10v2004-20241007-en
General
-
Target
f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exe
-
Size
391KB
-
MD5
56396c3f090f5506f991ad64677edf91
-
SHA1
1e9e86a9aa52c7b1889e48400127b95715b65ef5
-
SHA256
f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a
-
SHA512
e9a8ad9719baa0db479010d36e1e394aada8755144e24df69f62aa88f90e77d97f2f5ed161d3a699e0c626d6cef765031dc085987718cc452941b8178aec3119
-
SSDEEP
6144:/pOeL+kqcgnfTjGp/clSVaQo9+5Dixhm3/D5KE7hUH:ROe6kt2fTCtVw+tixhmlh7hA
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1872-4-0x0000000002BF0000-0x0000000002C36000-memory.dmp family_redline behavioral1/memory/1872-5-0x0000000004760000-0x00000000047A4000-memory.dmp family_redline behavioral1/memory/1872-44-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-42-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-40-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-38-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-36-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-34-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-32-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-30-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-28-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-26-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-24-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-22-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-20-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-18-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-16-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-14-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-12-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-10-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-8-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-7-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-70-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-68-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-66-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-64-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-62-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-60-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-58-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-56-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-54-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-52-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-50-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-48-0x0000000004760000-0x000000000479E000-memory.dmp family_redline behavioral1/memory/1872-46-0x0000000004760000-0x000000000479E000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exedescription pid process Token: SeDebugPrivilege 1872 f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exe"C:\Users\Admin\AppData\Local\Temp\f58195c4ee2ad2322f3bfc78f390d1850440e1e2bcc101abbeb1c54c3493d34a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1872