Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
c90e8f75987b4eb1e5b5f399073f98947526894a528ece557c48ca3b01cc1ca3.exe
Resource
win7-20240903-en
General
-
Target
c90e8f75987b4eb1e5b5f399073f98947526894a528ece557c48ca3b01cc1ca3.exe
-
Size
364KB
-
MD5
88c9b6c03f9aca9c38bbded6e9a3db2e
-
SHA1
99600caab3a2a339d01e4ea8b252e880e9243c7d
-
SHA256
c90e8f75987b4eb1e5b5f399073f98947526894a528ece557c48ca3b01cc1ca3
-
SHA512
61d575c98741dbc5d307e6be9029e50402d3efa3e9a6cd4e2c77c456f8eca4a3c84ab61e640cf575323f69b571b9428e57ab16eb8e6eb6e158db4ef1668ee9e2
-
SSDEEP
6144:BFxuXpbvsKVZuVIA/h93MRfmfxEBMb6yQpB/VBDGjE1U2RYIADG8elx:B/uXFvsKVEVrpQe5qM2yApVJGwZYxDs
Malware Config
Extracted
redline
paladin
188.68.201.6:10085
-
auth_value
f27db372188045eefdf974196ead3dae
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2788-3-0x0000000003010000-0x0000000003046000-memory.dmp family_redline behavioral1/memory/2788-4-0x0000000004BC0000-0x0000000004BF2000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2788-3-0x0000000003010000-0x0000000003046000-memory.dmp family_sectoprat behavioral1/memory/2788-4-0x0000000004BC0000-0x0000000004BF2000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c90e8f75987b4eb1e5b5f399073f98947526894a528ece557c48ca3b01cc1ca3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c90e8f75987b4eb1e5b5f399073f98947526894a528ece557c48ca3b01cc1ca3.exe