Analysis
-
max time kernel
111s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
04545524e0f035f178ab770c9e0ddbfa28f7d3be883a5e82b96f143c7200eec3.exe
Resource
win7-20240903-en
General
-
Target
04545524e0f035f178ab770c9e0ddbfa28f7d3be883a5e82b96f143c7200eec3.exe
-
Size
370KB
-
MD5
fd2a0a75fe3d1338edd547cc0ee875da
-
SHA1
3969bc086c6208e0c19b27f098efab8614308ceb
-
SHA256
04545524e0f035f178ab770c9e0ddbfa28f7d3be883a5e82b96f143c7200eec3
-
SHA512
dde353e10afa372dc996b7cf047c18aa0c91e63e575894b78792dfe8d4c7f06aa9e2760d9c8a5efe8ae57204e88a0ef520c5775ca217e333db9c441c955ee8ae
-
SSDEEP
6144:qhIThNgnnTAReO9KcYZPyXYNU4ih/CdcPm66dJo8j9vsv+iV:jNanT10XY64ih/CdX66dJouO+iV
Malware Config
Extracted
redline
PUB
45.9.20.182:52236
-
auth_value
a272f3a2850ec3dccdaed97234b7c40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1764-4-0x0000000003480000-0x00000000034A4000-memory.dmp family_redline behavioral2/memory/1764-7-0x0000000003710000-0x0000000003732000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1764-4-0x0000000003480000-0x00000000034A4000-memory.dmp family_sectoprat behavioral2/memory/1764-7-0x0000000003710000-0x0000000003732000-memory.dmp family_sectoprat -
Sectoprat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
04545524e0f035f178ab770c9e0ddbfa28f7d3be883a5e82b96f143c7200eec3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04545524e0f035f178ab770c9e0ddbfa28f7d3be883a5e82b96f143c7200eec3.exe