Analysis
-
max time kernel
111s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
Resource
win10v2004-20241007-en
General
-
Target
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
-
Size
487KB
-
MD5
d2b0f835197f7c239169ac580c6d157b
-
SHA1
5884120dbacdf6627a4ca2065cf1539f5f571002
-
SHA256
ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee
-
SHA512
de324035ba9ab8385b5dc9d5b6b91525502fee26c3941aa0917954a401f6a3407f8d400870da5d1a2d30a56d25377d9465a263120012d4a7a7e40b648b0dd327
-
SSDEEP
12288:Lyh3nPN3VoIuqmMBTn7WT7hiugUE/p9xiXqvS:LknPvuqfBj7WT1RQ/GqK
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/5044-5-0x0000000002910000-0x000000000294C000-memory.dmp family_redline behavioral2/memory/5044-7-0x0000000002C60000-0x0000000002C9A000-memory.dmp family_redline behavioral2/memory/5044-69-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-51-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-37-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-21-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-8-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-71-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-67-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-65-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-63-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-61-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-59-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-57-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-55-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-53-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-49-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-47-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-45-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-43-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-41-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-39-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-35-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-33-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-31-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-29-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-27-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-25-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-23-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-19-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-17-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-15-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-13-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-11-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline behavioral2/memory/5044-9-0x0000000002C60000-0x0000000002C95000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5044 ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe"C:\Users\Admin\AppData\Local\Temp\ca4bc0ee61713beb5b9289a8612e826ff174318fd18452cf877e9a76aec5f4ee.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5044