Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:13
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_f9262caed7ba0fc77e871e26d9a5b4eb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9262caed7ba0fc77e871e26d9a5b4eb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/Selfconvened.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$TEMP/Selfconvened.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/qT5w4MkRQwNB.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$TEMP/qT5w4MkRQwNB.exe
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/qT5w4MkRQwNB.exe
-
Size
836KB
-
MD5
b1053be5f3586f6785a57c911addc48c
-
SHA1
712b1ed92154916d48d20476cf7ff12da0c57609
-
SHA256
e0c190537e74cb9253f2bf68203513de2a258ef427dbff8552310d8767adf71c
-
SHA512
1d5b0f9c40ea2796b65835e11b1dff542d38607558dd903a922a3dea0f5e3ac117b6dcb597710d5c36851e737b1dce8069b94cff87b18c517928bcc9645eb7f4
-
SSDEEP
12288:8TxETvPX2P3+6OCKLSx/XH5Zf6Rhcar4+QR5cepnSCdeTnEFMwuOqjYd:w+Tv+PO6OsxPTM94TSCdeKMwqjYd
Malware Config
Extracted
redline
@hatake03
95.181.152.6:46927
-
auth_value
cdf3919a262c0d6ba99116b375d7551c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral6/memory/2348-7-0x0000000000730000-0x000000000075E000-memory.dmp family_redline behavioral6/memory/2348-0-0x0000000000730000-0x000000000075E000-memory.dmp family_redline behavioral6/memory/2348-9-0x0000000000970000-0x0000000000990000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qT5w4MkRQwNB.exe