Overview
overview
10Static
static
SkyBlade/M...ter.js
windows7_x64
1SkyBlade/M...ter.js
windows10-2004_x64
1SkyBlade/M...x.html
windows7_x64
1SkyBlade/M...x.html
windows10-2004_x64
1SkyBlade/M...dex.js
windows7_x64
1SkyBlade/M...dex.js
windows10-2004_x64
1SkyBlade/M...nav.js
windows7_x64
1SkyBlade/M...nav.js
windows10-2004_x64
1SkyBlade/M...e.html
windows7_x64
1SkyBlade/M...e.html
windows10-2004_x64
1SkyBlade/M...o.html
windows7_x64
1SkyBlade/M...o.html
windows10-2004_x64
1SkyBlade/M...b.html
windows7_x64
1SkyBlade/M...b.html
windows10-2004_x64
1SkyBlade/M...s.html
windows7_x64
1SkyBlade/M...s.html
windows10-2004_x64
1SkyBlade/M...a.html
windows7_x64
1SkyBlade/M...a.html
windows10-2004_x64
1SkyBlade/M...m.html
windows7_x64
1SkyBlade/M...m.html
windows10-2004_x64
1SkyBlade/M...t.html
windows7_x64
1SkyBlade/M...t.html
windows10-2004_x64
1SkyBlade/S...me.exe
windows7_x64
SkyBlade/S...me.exe
windows10-2004_x64
10Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
14-04-2022 13:39
Static task
static1
Behavioral task
behavioral1
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/highlighter.js
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/highlighter.js
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/index.html
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/index.html
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/index.js
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/index.js
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/nav.js
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/nav.js
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/ExitNode.html
Resource
win7-20220331-en
Behavioral task
behavioral10
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/ExitNode.html
Resource
win10v2004-20220331-en
Behavioral task
behavioral11
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/LevelInfo.html
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/LevelInfo.html
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/LevelMob.html
Resource
win7-20220331-en
Behavioral task
behavioral14
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/LevelMob.html
Resource
win10v2004-20220331-en
Behavioral task
behavioral15
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/LevelProps.html
Resource
win7-20220310-en
Behavioral task
behavioral16
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/LevelProps.html
Resource
win10v2004-20220331-en
Behavioral task
behavioral17
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/Meta.html
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/Meta.html
Resource
win10v2004-20220331-en
Behavioral task
behavioral19
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/SeededRandom.html
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/SeededRandom.html
Resource
win10v2004-20220331-en
Behavioral task
behavioral21
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/Struct.html
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
SkyBlade/ModTools/Scripts/TechnicalDocumentation/tool/mod/script/Struct.html
Resource
win10v2004-20220331-en
Behavioral task
behavioral23
Sample
SkyBlade/StartGame.exe
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
SkyBlade/StartGame.exe
Resource
win10v2004-20220310-en
General
-
Target
SkyBlade/StartGame.exe
-
Size
1.8MB
-
MD5
22e9a832c4c9bb705d65ff11b31daab4
-
SHA1
e03118acc0918d828a5e41c2467642758148a09d
-
SHA256
ca88d5e1d164070489ab499916a5327b369c1f919c5ace2629f2fd33f89c6d49
-
SHA512
a22112ea127df4349984bf3ef69426e10853b744ecf9ee20206a1c9b6bf2fa54bce96f614d797d165d0e32f105a8972096fb3ec3efe32915029cf6c12024aa89
Malware Config
Extracted
redline
1
65.108.41.163:38151
-
auth_value
95517c2a2f56575288c35d9dfde4a6aa
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral24/memory/2368-137-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2640 set thread context of 2368 2640 StartGame.exe 81 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2368 2640 StartGame.exe 81 PID 2640 wrote to memory of 2368 2640 StartGame.exe 81 PID 2640 wrote to memory of 2368 2640 StartGame.exe 81 PID 2640 wrote to memory of 2368 2640 StartGame.exe 81 PID 2640 wrote to memory of 2368 2640 StartGame.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\SkyBlade\StartGame.exe"C:\Users\Admin\AppData\Local\Temp\SkyBlade\StartGame.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-