Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 04:35
Behavioral task
behavioral1
Sample
9251f4245aca53104803e916d448f9728db0e3f70b72692361afb5588bc4dd50.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9251f4245aca53104803e916d448f9728db0e3f70b72692361afb5588bc4dd50.exe
Resource
win10v2004-20241007-en
General
-
Target
9251f4245aca53104803e916d448f9728db0e3f70b72692361afb5588bc4dd50.exe
-
Size
168KB
-
MD5
3623099f6110542800cfa46900653619
-
SHA1
fb80a1a2e55d160c4538509e7f8d3cdc573ee5dd
-
SHA256
9251f4245aca53104803e916d448f9728db0e3f70b72692361afb5588bc4dd50
-
SHA512
2b9b985a4ca16bd0104477f741721177aa6aef1216434729d72a3b2d06f9646ca27352b3b09bd0485a697c4eab75c36047ee059d02f0938260dded79f477b62c
-
SSDEEP
3072:iKAauIg8WXywg4y1LqVcwUN2rRK0J8e8hxx:iKAfrszeRK0Ja
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2716-1-0x0000000000280000-0x00000000002AE000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9251f4245aca53104803e916d448f9728db0e3f70b72692361afb5588bc4dd50.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9251f4245aca53104803e916d448f9728db0e3f70b72692361afb5588bc4dd50.exe