Analysis
-
max time kernel
111s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
Resource
win10v2004-20241007-en
General
-
Target
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
-
Size
487KB
-
MD5
d2b0f835197f7c239169ac580c6d157b
-
SHA1
5884120dbacdf6627a4ca2065cf1539f5f571002
-
SHA256
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee
-
SHA512
de324035ba9ab8385b5dc9d5b6b91525502fee26c3941aa0917954a401f6a3407f8d400870da5d1a2d30a56d25377d9465a263120012d4a7a7e40b648b0dd327
-
SSDEEP
12288:Lyh3nPN3VoIuqmMBTn7WT7hiugUE/p9xiXqvS:LknPvuqfBj7WT1RQ/GqK
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3012-5-0x00000000021D0000-0x000000000220C000-memory.dmp family_redline behavioral1/memory/3012-6-0x0000000002530000-0x000000000256A000-memory.dmp family_redline behavioral1/memory/3012-7-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-8-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-10-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-12-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-14-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-16-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-20-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-29-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-52-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-70-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-68-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-66-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-64-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-62-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-60-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-58-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-56-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-55-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-50-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-49-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-46-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-44-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-42-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-40-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-38-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-36-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-34-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-32-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-30-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-26-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-24-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-22-0x0000000002530000-0x0000000002565000-memory.dmp family_redline behavioral1/memory/3012-18-0x0000000002530000-0x0000000002565000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe"C:\Users\Admin\AppData\Local\Temp\ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012