Analysis
-
max time kernel
121s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-02-2025 18:20
Behavioral task
behavioral1
Sample
390FC6C7C2B8F8D411F425A8E4CCAC38.exe
Resource
win7-20240708-en
General
-
Target
390FC6C7C2B8F8D411F425A8E4CCAC38.exe
-
Size
95KB
-
MD5
390fc6c7c2b8f8d411f425a8e4ccac38
-
SHA1
a61674f6ef386be9c89d42dc8c7fd50a2f775fb2
-
SHA256
f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3
-
SHA512
0c4fff1b0ebbedc63df667740151f5fee3dc0a5025cf9681f2915fc3667cfaa473cbd5ecbd4515dc9c28b8c2f8915c2e3cc0776031ee7e1ce58b64389854dc04
-
SSDEEP
1536:FqsIhaqpalbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2otmulgS6pQl:DGaKaYP+zi0ZbYe1g0ujyzdMQ
Malware Config
Extracted
redline
20250129
103.84.89.222:33791
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2312-1-0x0000000000160000-0x000000000017E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/2312-1-0x0000000000160000-0x000000000017E000-memory.dmp family_sectoprat -
Sectoprat family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 390FC6C7C2B8F8D411F425A8E4CCAC38.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2312 390FC6C7C2B8F8D411F425A8E4CCAC38.exe 2312 390FC6C7C2B8F8D411F425A8E4CCAC38.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2312 390FC6C7C2B8F8D411F425A8E4CCAC38.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5aada6b7c508d2beeb54a6bbb98e4b18f
SHA1f96e0355c4275913971c9b9648e3bfa759910c9b
SHA256211f1364da21ad52a041d0b51d8f9519ae23b40ecfebba95e30dae41b5906a34
SHA512f508283619295eb54487d97c8bf1e08f8deffb07c6469f8950cc00698439cff2d4eb92d5fd1cd41d1670b005b9933369acc4c714dbf3086121cdc410428e26f4
-
Filesize
442KB
MD561ace524b72795dcb1a946e7b977492d
SHA12318128df4b33d5541ca3758810eabc2cafdad2b
SHA256a0d35f06815e459afbca79be08c59a10518cf615bbc198957a49d0d8bba6a761
SHA512a7f83be6d5172d6b2bb378cd3a6a73433ad46611253d8ff441e5ea2ecc97f892ec88ec67da0bab47e354222411348c1b7445e3091100b8e0c44f1b2ae04da116
-
Filesize
13KB
MD58a53ac4ee35716bc4d429b7bd722757e
SHA1e16f5f2a405d17fd1dd569edfc9dec653456a474
SHA25612fe7d7b65be7769db991f4de309d2a40f695132b24743a35ce26efbd0bdbc21
SHA5127d3403b93e2616a2d07554edbfcb2023114723718f8e23d7c655617a4a1efe981fa0fcd1efdfdbef99b64676bb6976774575cb021575d98d31571a4788ab58f9
-
Filesize
304KB
MD58597af0fa82fc565392193ca0b191bd8
SHA105a7320aa867db2d935160e044c1e0951e639542
SHA2566edd01e042eb4da6f2e759393c6e218bb9b16d9995268a17fa4aaf3ec13f0502
SHA512ffa17da6eabca9598a6062bd5ea00bd9e5a42f6bd170f7109e6975beca1ccba484fd1594f8e22ccd98ef3416e1f9de3f72129fd8bec8dbebae34cde27b4044a9
-
Filesize
20KB
MD51a662f00524b7fa4cf9212b68e6964bc
SHA1b369152f69c1fe71edcaaecf550dd0bc9df07f68
SHA2562f68011b5abd6759bf15c4d6cc067e711846ead0db27eec02675a8b2246cabbb
SHA51281c9d43bdfe401acd224db07210af9daba722254cdeb1afd6c46f2889df2538487a14ee9a477a8cd5e31d44050c1e72591b4cda8d6a579c03f47a28a61c21e46
-
Filesize
1.8MB
MD5f3ad816ca4fbc5826b2aff2870e93972
SHA197f9a68f5dc8f287a94cabd8d0897b83a6d86646
SHA25624bccc85cda5d68e24a480fefc63004c58ddc373607460c0ab5380783b13a66e
SHA512924ee1cda0006cec6157cdf0754e9efd8499e693ae9e1854f5e59a75d6ca3b5d5ffe08c971f2409073de48b0dafbbb0b5a8ebbed2271d4f585a52fa192bce97d
-
Filesize
14KB
MD5ba624f96a0dc21ff5861af91b7adf3b2
SHA12bc4027927ffc01b989a2140756139fd1992b0fd
SHA256d1a0fbfd3398356963a0a4452d7b08bf595a804ccab2c780e475c0510f183ba4
SHA5123136eb35d37cd045de966777988f09257662be81837024e92c91268348d6e2ff2b568c54fef217a9816fbeba5cc5a9d9a01f60e9441b510b1480c2b01ff14c72
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5a58d87b023e155c10b4e15fdfc6fcb06
SHA10ee449b782aeac54c0406adde543f19ecd9dfd38
SHA256331b040f0bd7731b64e72a837ad86943379ff02e239c305d200108fe7e3c8c61
SHA5121965574101a71a640efb135a49c4a968fd5feb328779c33936047afb2209424b44fba3a1ccdacee959ce5a016f22b49c8b42dc543476b11f83df0feb1b080eae