Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 03:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f600d5e0f9a95a876b9887dd00fc6632.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f600d5e0f9a95a876b9887dd00fc6632.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/Minsteryard.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/Minsteryard.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/fYxbPKoziOFe.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
$TEMP/fYxbPKoziOFe.exe
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/fYxbPKoziOFe.exe
-
Size
839KB
-
MD5
9de8c7cb28923bbe39c5c668eae0f21f
-
SHA1
1f4d88fadb7648033c16a983376e96ce2f7b0039
-
SHA256
844f5a9d5b9b4a552325449601071e0ecf449b04232ec16ddffe03ae404fc8a4
-
SHA512
d2f310f98551207b1842d307cf17a1a175676b92cecde885d66b2b58e34da7664ca4e007a724bcb4bda35b10f4b8f0dec81bbe59f9ee3d07915c75eb37257278
-
SSDEEP
12288:YL7CSb2gLre1WYMEUSILvWdbGSexg+rrMgpAz47kDLj/BRsDklNsSa:27rPfeECUbLAneq06uk/j5Rs4lWSa
Malware Config
Extracted
redline
@F1gaSebe
95.181.152.6:46927
-
auth_value
cdf3919a262c0d6ba99116b375d7551c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral6/memory/1556-0-0x0000000000430000-0x000000000045E000-memory.dmp family_redline behavioral6/memory/1556-7-0x0000000000430000-0x000000000045E000-memory.dmp family_redline behavioral6/memory/1556-9-0x0000000000960000-0x0000000000980000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fYxbPKoziOFe.exe