Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11/07/2022, 08:44

General

  • Target

    GTA V HACK LOADER.exe

  • Size

    1.1MB

  • MD5

    78b4463a2bfb8006af24ba3b5e5f5ecd

  • SHA1

    c970d398489d07214ccb5f5a3fe623a749fa82b7

  • SHA256

    075c65d7a64fafe66c002d27d35dc359429ec00808a6ad222fdc51b58bd00da0

  • SHA512

    6c3f0c872dc1fc1224a89316f5d3b18a6a08535b6f85c578951c61967572a2783debd779895a6c0adee4bbd4607ab23ca5df310963ff3634865842c998bd8141

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    e175ba0fcadafb575694f32d59147a70

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GTA V HACK LOADER.exe
    "C:\Users\Admin\AppData\Local\Temp\GTA V HACK LOADER.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:403072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/403072-131-0x0000000000800000-0x0000000000820000-memory.dmp

    Filesize

    128KB

  • memory/403072-136-0x0000000005A70000-0x0000000006088000-memory.dmp

    Filesize

    6.1MB

  • memory/403072-137-0x00000000072F0000-0x0000000007302000-memory.dmp

    Filesize

    72KB

  • memory/403072-138-0x0000000007420000-0x000000000752A000-memory.dmp

    Filesize

    1.0MB

  • memory/403072-139-0x0000000007360000-0x000000000739C000-memory.dmp

    Filesize

    240KB

  • memory/403072-140-0x0000000007F90000-0x0000000008006000-memory.dmp

    Filesize

    472KB

  • memory/403072-141-0x00000000080B0000-0x0000000008142000-memory.dmp

    Filesize

    584KB

  • memory/403072-142-0x0000000008700000-0x0000000008CA4000-memory.dmp

    Filesize

    5.6MB

  • memory/403072-143-0x0000000008010000-0x000000000802E000-memory.dmp

    Filesize

    120KB

  • memory/403072-144-0x00000000083C0000-0x0000000008426000-memory.dmp

    Filesize

    408KB

  • memory/403072-145-0x00000000093D0000-0x0000000009420000-memory.dmp

    Filesize

    320KB

  • memory/403072-146-0x00000000096F0000-0x00000000098B2000-memory.dmp

    Filesize

    1.8MB

  • memory/403072-147-0x0000000009DF0000-0x000000000A31C000-memory.dmp

    Filesize

    5.2MB