Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6.exe
Resource
win10v2004-20241007-en
General
-
Target
a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6.exe
-
Size
487KB
-
MD5
676d629b1f23463e78d8f38a450250ab
-
SHA1
f4338a04320f09746e24630a11d126667e9d33de
-
SHA256
a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6
-
SHA512
c9d1968c74a2b77a16a5281cfdcd9d00c854a9642a8f1a4c686e0bf8b677405a643d07fcfb82c5c84dcac2c3462d6b3257894ad05d4d7386264325f89816e6b6
-
SSDEEP
12288:Gyh3nPN3VoIuqmMBTn7WT7hiugUE/p9xiXqvm:GknPvuqfBj7WT1RQ/GqO
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral2/memory/1016-5-0x0000000002850000-0x000000000288C000-memory.dmp family_redline behavioral2/memory/1016-7-0x0000000004F70000-0x0000000004FAA000-memory.dmp family_redline behavioral2/memory/1016-8-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-19-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-17-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-15-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-13-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-11-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-9-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-53-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-41-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-71-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-69-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-67-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-65-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-63-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-61-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-59-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-57-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-55-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-51-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-49-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-47-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-46-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-43-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-39-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-37-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-35-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-33-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-31-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-29-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-27-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-25-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-23-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline behavioral2/memory/1016-21-0x0000000004F70000-0x0000000004FA5000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1016 a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6.exe"C:\Users\Admin\AppData\Local\Temp\a09bc7b3e4499731a97c91b40942617062987af5ddbcdc7930b66d430d8236a6.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1016