Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb.exe
Resource
win10v2004-20241007-en
General
-
Target
c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb.exe
-
Size
485KB
-
MD5
481e9b043d51cbff01b1dea624c95a69
-
SHA1
9e74714fc92ad1a3b0e565d62e0c75164232242c
-
SHA256
c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb
-
SHA512
7958084d46a49cbb36ea8a83df67e89a5abc9a996103752116d211b28cc68170fc8147d472b2c3407658da94ba374a59dbdd2d8b1183a9e773f9d7fd50228e71
-
SSDEEP
6144:kaZ+W9VmqZLSnZj86QtArZ1sHCmaj84iZscMv2QXdmpCZdNL1Ukfp33a5gfmVyIe:kOV9DZYZj8urPsERiZY+Qtm2x3K5h1vW
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2856-5-0x00000000009F0000-0x0000000000A2C000-memory.dmp family_redline behavioral1/memory/2856-6-0x0000000002330000-0x000000000236A000-memory.dmp family_redline behavioral1/memory/2856-7-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-8-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-10-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-36-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-56-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-14-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-16-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-12-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-18-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-20-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-22-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-24-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-26-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-28-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-30-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-32-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-34-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-42-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-58-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-68-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-70-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-66-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-64-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-63-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-60-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-54-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-52-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-50-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-48-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-46-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-44-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-40-0x0000000002330000-0x0000000002365000-memory.dmp family_redline behavioral1/memory/2856-38-0x0000000002330000-0x0000000002365000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2856 c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb.exe"C:\Users\Admin\AppData\Local\Temp\c644a9d1773e7bfe03b4bc5e8c709ac858a2905d97cbd3f12f8cc033c717e8cb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2856