Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c.exe
Resource
win10v2004-20241007-en
General
-
Target
8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c.exe
-
Size
487KB
-
MD5
afd9b78d2872c15227c9d8c24f36aabc
-
SHA1
b5d5c58b30739d28eddb33b47b61ef54254566c3
-
SHA256
8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c
-
SHA512
92da8c10d05a1134325e2f9a4058bcf333c7e65d7a95f8ee6583f26eabdf4cb69460d3abed0a9a7374ba57532c6b88c5366ea6f2eef0b7621eb911fab0e3a989
-
SSDEEP
12288:2yh3nPN3VoIuqmMBTn7WT7hiugUE/p9xiXqvi:2knPvuqfBj7WT1RQ/Gq6
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/3312-5-0x0000000002900000-0x000000000293C000-memory.dmp family_redline behavioral2/memory/3312-7-0x0000000002B00000-0x0000000002B3A000-memory.dmp family_redline behavioral2/memory/3312-55-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-41-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-21-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-8-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-71-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-69-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-67-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-65-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-63-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-61-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-59-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-57-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-53-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-51-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-50-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-47-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-45-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-43-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-39-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-37-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-35-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-34-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-31-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-29-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-28-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-25-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-23-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-19-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-17-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-15-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-13-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-11-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline behavioral2/memory/3312-9-0x0000000002B00000-0x0000000002B35000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3312 8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c.exe"C:\Users\Admin\AppData\Local\Temp\8e205da73421dbbddda5f55c7f057ec56b88e5517a526edbcc0f6492ea8ed80c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3312