Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 05:15
Behavioral task
behavioral1
Sample
f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe
Resource
win7-20240903-en
General
-
Target
f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe
-
Size
95KB
-
MD5
390fc6c7c2b8f8d411f425a8e4ccac38
-
SHA1
a61674f6ef386be9c89d42dc8c7fd50a2f775fb2
-
SHA256
f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3
-
SHA512
0c4fff1b0ebbedc63df667740151f5fee3dc0a5025cf9681f2915fc3667cfaa473cbd5ecbd4515dc9c28b8c2f8915c2e3cc0776031ee7e1ce58b64389854dc04
-
SSDEEP
1536:FqsIhaqpalbG6jejoigIP43Ywzi0Zb78ivombfexv0ujXyyed2otmulgS6pQl:DGaKaYP+zi0ZbYe1g0ujyzdMQ
Malware Config
Extracted
redline
20250129
103.84.89.222:33791
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1200-1-0x0000000000B80000-0x0000000000B9E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/1200-1-0x0000000000B80000-0x0000000000B9E000-memory.dmp family_sectoprat -
Sectoprat family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1200 f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe 1200 f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1200 f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe"C:\Users\Admin\AppData\Local\Temp\f52ae5e6bfc76f9ea38be634ce95f6d599ca39c643bc6b8fda09a62213e01cb3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD50040f587d31c3c0be57da029997f9978
SHA1d4729f8ed094797bd54ea8a9987aaa7058e7eaa2
SHA256a285e3bc24d218869afd114c236f0aafebeba96d4105ddd379ae31f03b26079b
SHA5123e4ffca2ff979b5f91a0c8d5d1fa52f0ab47ff63e50b1cc5e7708c4ba8359ee8505a9259f329da5733048e953f0778af73ce76735b481d558dd05a2cb45a5977
-
Filesize
13KB
MD5c44425ec890626ffa136d74bf6fe11f3
SHA109e5cdf81713b541e6a7ce63308c0bbd4e8e18bb
SHA2566b25f744f461b512c539c7aae5e601f8a7e0d46ef6315914c3cc9b62d45cc2c8
SHA512b25227bcba4938c473724fbaf73cb10113e3208c435b60dbee13d0c080b1aa84fd529af83eea092eb796d7668570f99d03f8c6007e834935717e19e8cedcca47
-
Filesize
341KB
MD535751e387cb16a3e1e21dae1d8c04bc3
SHA14232cc1e365bb5be70134a8a8774109c4e26f619
SHA256944e65065c36c264937d2d21feeb9b92f0fbd3c0bfbd0fcb510c8d0c60905835
SHA5128f2fc6eb1ae791842e44fb12029c1f8a3766746334fb32482c46f53fa5e588ba49f824bc6c7838671b883c58ecbfcb3e2b566fcf05d2ed1e4f189d0061a8a21a
-
Filesize
17KB
MD5a6459299d9444c1b9c3f7b545213f8c3
SHA17ef39e1758f652f399d53798861f607f030853fe
SHA2565b464e6da43694f6da0ade7e014346e2cd279d2cb69d2d83c3d08eebceb73c12
SHA5123857ad335f83b9b5e03e4a5bd8028c1d56b52a127e90f8c3a1bd104c5d1cf2a12e87e96603c5528c679d29f847fda498348c637cf521d2401f2ac0ac8b32f104
-
Filesize
455KB
MD523ba92772f36c37555dacc5f3e0824cc
SHA10bbba5a57f4b7ba611f643004054b1f9a000fc45
SHA2562e2e2b83dd9ad2fd13c00a2b2b706930ab237c30bb80be41fd3173827747fff0
SHA51228bfb348f51167db37bd15cde3d4aa5c427f3b92743b68389825931649bf9f90fe6ab7e5cea6bb86f52a90b27b0ce46ee36b5f9b8596bec11a7140618b31b933
-
Filesize
14KB
MD5a1f2494de91b4fc11b8c2199f4d76801
SHA15385c617fcdbc09a1d5b9ee812627ac2a956637d
SHA256ac6c5f48bb4f068ed04aee2926e4fbf71e2a80a30f99c420e0751797357bfdde
SHA51220e622e6e419caa1e8b3fb097becd1ea2f868e0bcd40cead43af1852b7c1a26d18b3beb2f197667c38ae421c7b2f07e2327ee17d1df6fb64a2f11a972f822336
-
Filesize
13KB
MD5e73db420b5b964852d469beca4840f97
SHA11ca05cbe68a674e4ec274967390b5e4c1a4baebf
SHA256c94362f4ab170edebe21f9baacb7f444ba5e85d6197b5dac995f72390ff3b657
SHA512076e10714cb5de66a550d5ebaad40fc7524890539894333f68ce20d4bbdfe372bd644e22309667e31317cd5c309bb3dee1a247e5dd5fb80efc78b9a120aaaf91
-
Filesize
18KB
MD55d3133747e7b8257a6682ecc0b197a71
SHA13015448d37026853c8c11a582a3dfb73feaf0313
SHA2569f1cf2701f39743be3cbc4bd840f63cb8a1e87b8a8b83fb143b19fa3a2288e26
SHA5128ee616e0190e8306fb52ff00e3cfc209537a6ca2847992bbcccfda8a0ed5902c06d4c9ed77c9625a2a39828d8e3071fd6bacbd241fae3edab19a869622599c7b