Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 13:49
Static task
static1
Behavioral task
behavioral1
Sample
78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe
Resource
win10v2004-20241007-en
General
-
Target
78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe
-
Size
1.2MB
-
MD5
233625e99d53b6377d86f9f3229507c0
-
SHA1
8d3da410f683da8c675522ee23342acec806ba9f
-
SHA256
78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704
-
SHA512
f2004740c92a355e41c421dba05c27f7e656581dc4339ccaf553383271976e6aea25d4a2dee0311a068960a5b0f3e74a4c232c6641b1365b3bb01c37898a3077
-
SSDEEP
24576:QU5CAV1KkambIIyjM6JKgdHzIDIlpmKofXQJ46xUidOZAtzkeZqkY84luY:QI5RambIIy4zg1ptyRiT8
Malware Config
Extracted
redline
discord
185.215.113.8:80
-
auth_value
594ba2fece375e3fa7bf98905ccc6088
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/552-9-0x0000000007F00000-0x0000000007F20000-memory.dmp family_redline -
Redline family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe 552 78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe"C:\Users\Admin\AppData\Local\Temp\78964c621c4c61e290c7df5f8ed00afd8576a07405d7a044a6dc98172943e704N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:552