Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11/07/2022, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
GTA V HACK LOADER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
GTA V HACK LOADER.exe
Resource
win10v2004-20220414-en
General
-
Target
GTA V HACK LOADER.exe
-
Size
1.1MB
-
MD5
78b4463a2bfb8006af24ba3b5e5f5ecd
-
SHA1
c970d398489d07214ccb5f5a3fe623a749fa82b7
-
SHA256
075c65d7a64fafe66c002d27d35dc359429ec00808a6ad222fdc51b58bd00da0
-
SHA512
6c3f0c872dc1fc1224a89316f5d3b18a6a08535b6f85c578951c61967572a2783debd779895a6c0adee4bbd4607ab23ca5df310963ff3634865842c998bd8141
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
e175ba0fcadafb575694f32d59147a70
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/401212-56-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/401212-61-0x000000000041B53E-mapping.dmp family_redline behavioral1/memory/401212-62-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/401212-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/692-78-0x0000000001170000-0x0000000001F49000-memory.dmp family_ytstealer behavioral1/memory/692-81-0x0000000001170000-0x0000000001F49000-memory.dmp family_ytstealer -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1708 MainModule.exe 692 start.exe -
resource yara_rule behavioral1/files/0x00130000000133fa-73.dat upx behavioral1/files/0x00130000000133fa-75.dat upx behavioral1/files/0x00130000000133fa-72.dat upx behavioral1/memory/692-78-0x0000000001170000-0x0000000001F49000-memory.dmp upx behavioral1/memory/692-81-0x0000000001170000-0x0000000001F49000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 401212 AppLaunch.exe 401212 AppLaunch.exe 401212 AppLaunch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1516 set thread context of 401212 1516 GTA V HACK LOADER.exe 28 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 401212 AppLaunch.exe 692 start.exe 692 start.exe 1708 MainModule.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 401212 AppLaunch.exe Token: SeDebugPrivilege 1708 MainModule.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 1516 wrote to memory of 401212 1516 GTA V HACK LOADER.exe 28 PID 401212 wrote to memory of 1708 401212 AppLaunch.exe 30 PID 401212 wrote to memory of 1708 401212 AppLaunch.exe 30 PID 401212 wrote to memory of 1708 401212 AppLaunch.exe 30 PID 401212 wrote to memory of 1708 401212 AppLaunch.exe 30 PID 401212 wrote to memory of 1708 401212 AppLaunch.exe 30 PID 401212 wrote to memory of 1708 401212 AppLaunch.exe 30 PID 401212 wrote to memory of 1708 401212 AppLaunch.exe 30 PID 401212 wrote to memory of 692 401212 AppLaunch.exe 31 PID 401212 wrote to memory of 692 401212 AppLaunch.exe 31 PID 401212 wrote to memory of 692 401212 AppLaunch.exe 31 PID 401212 wrote to memory of 692 401212 AppLaunch.exe 31 PID 692 wrote to memory of 1436 692 start.exe 34 PID 692 wrote to memory of 1436 692 start.exe 34 PID 692 wrote to memory of 1436 692 start.exe 34 PID 1436 wrote to memory of 1580 1436 cmd.exe 32 PID 1436 wrote to memory of 1580 1436 cmd.exe 32 PID 1436 wrote to memory of 1580 1436 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\GTA V HACK LOADER.exe"C:\Users\Admin\AppData\Local\Temp\GTA V HACK LOADER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:401212 -
C:\Users\Admin\AppData\Local\Temp\MainModule.exe"C:\Users\Admin\AppData\Local\Temp\MainModule.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\start.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1436
-
-
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 01⤵PID:1580
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
893KB
MD59ab3691ba8196ae6fad9ff384fd58961
SHA1d1aeaa507786c09203af6fa1919a65448835bf8d
SHA2565a790c663bbfe807346fedf69f331e8ec5c63201e1adebaba5407656ea29e552
SHA51204e7300c224d9b54f41160e3175c69e0ab422096e267ba9ec44a29d09e8379bd24be08120eeb7a5cb64d84c1d20fcc3e9a8fe910af65408c17aa13ef27b73fa7
-
Filesize
893KB
MD59ab3691ba8196ae6fad9ff384fd58961
SHA1d1aeaa507786c09203af6fa1919a65448835bf8d
SHA2565a790c663bbfe807346fedf69f331e8ec5c63201e1adebaba5407656ea29e552
SHA51204e7300c224d9b54f41160e3175c69e0ab422096e267ba9ec44a29d09e8379bd24be08120eeb7a5cb64d84c1d20fcc3e9a8fe910af65408c17aa13ef27b73fa7
-
Filesize
4.0MB
MD506103d1e931ea83afb5cac974113c513
SHA1ef70b042a19addb747697ee3270e1723ff988f5c
SHA2565fdd4b20a3a14e37444235668e7f641e776e76104db82a17608d6ab283057b63
SHA512f97ea97ef1431baef2372a7499a76a1edd9494ea31d6544b456d77d18120b4fb73dbc494a36f022b13613c4c636beb59cfb23f96a3386e3f39e9be0e14e1060f
-
Filesize
893KB
MD59ab3691ba8196ae6fad9ff384fd58961
SHA1d1aeaa507786c09203af6fa1919a65448835bf8d
SHA2565a790c663bbfe807346fedf69f331e8ec5c63201e1adebaba5407656ea29e552
SHA51204e7300c224d9b54f41160e3175c69e0ab422096e267ba9ec44a29d09e8379bd24be08120eeb7a5cb64d84c1d20fcc3e9a8fe910af65408c17aa13ef27b73fa7
-
Filesize
4.0MB
MD506103d1e931ea83afb5cac974113c513
SHA1ef70b042a19addb747697ee3270e1723ff988f5c
SHA2565fdd4b20a3a14e37444235668e7f641e776e76104db82a17608d6ab283057b63
SHA512f97ea97ef1431baef2372a7499a76a1edd9494ea31d6544b456d77d18120b4fb73dbc494a36f022b13613c4c636beb59cfb23f96a3386e3f39e9be0e14e1060f
-
Filesize
4.0MB
MD506103d1e931ea83afb5cac974113c513
SHA1ef70b042a19addb747697ee3270e1723ff988f5c
SHA2565fdd4b20a3a14e37444235668e7f641e776e76104db82a17608d6ab283057b63
SHA512f97ea97ef1431baef2372a7499a76a1edd9494ea31d6544b456d77d18120b4fb73dbc494a36f022b13613c4c636beb59cfb23f96a3386e3f39e9be0e14e1060f