Overview
overview
10Static
static
3Media-Play...89.exe
windows7-x64
3Media-Play...89.exe
windows10-2004-x64
5Empire of dicks.exe
windows7-x64
1Empire of dicks.exe
windows10-2004-x64
102903faf44...7b.exe
windows7-x64
1002903faf44...7b.exe
windows10-2004-x64
10073731fa5a...56.exe
windows7-x64
10073731fa5a...56.exe
windows10-2004-x64
10172c26f891...27.exe
windows7-x64
1172c26f891...27.exe
windows10-2004-x64
101b59b0fa61...12.ps1
windows7-x64
11b59b0fa61...12.ps1
windows10-2004-x64
11d801e2756...cf.exe
windows7-x64
71d801e2756...cf.exe
windows10-2004-x64
7Analysis
-
max time kernel
596s -
max time network
603s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 23:00
Behavioral task
behavioral1
Sample
Media-Player_160889.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Media-Player_160889.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Empire of dicks.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Empire of dicks.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
02903faf446ed43d79a8509e7743b41eab9605cfb48261bb2105176c3d4a877b.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
02903faf446ed43d79a8509e7743b41eab9605cfb48261bb2105176c3d4a877b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
172c26f8914c92702cdbe134bf65280a1381a91e869f7eac0e62f7527.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
172c26f8914c92702cdbe134bf65280a1381a91e869f7eac0e62f7527.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
1b59b0fa612e7c3d9ce272143058be6815b4ec563dfd7e1782657fe7c2f23812.ps1
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
1b59b0fa612e7c3d9ce272143058be6815b4ec563dfd7e1782657fe7c2f23812.ps1
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
1d801e2756c864d01cd456f68752a86c52981576839625759ae9e400f0d2a2cf.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
1d801e2756c864d01cd456f68752a86c52981576839625759ae9e400f0d2a2cf.exe
Resource
win10v2004-20231215-en
General
-
Target
073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe
-
Size
2.9MB
-
MD5
41b2380b454cfa680b4d2b30440e8109
-
SHA1
f767fbbf9ddeb69c69d0cde4927957647e8a019d
-
SHA256
073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456
-
SHA512
a2600fd86158ef8481c18acf1a74c961058b4fbf1e9461294eb39475e634fbbcdea1f60b28cbc8669cd7be17f6406743834b137f44169c3a455f7551d7164421
-
SSDEEP
12288:opUCj2KN8HnbttOCHfVNWDO2wF6edg0ASy0EPmLUd0btZcodN2BOjDyhC:opUCjobH9kDPww0QSyk0FhC
Malware Config
Extracted
redline
168.119.228.126:11552
-
auth_value
ee2d0ef2a4d0cbee5b6303070e44cb8a
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral7/memory/2864-7-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral7/memory/2864-8-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral7/memory/2864-10-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral7/memory/2864-12-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral7/memory/2864-14-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2324 set thread context of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30 PID 2324 wrote to memory of 2864 2324 073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe"C:\Users\Admin\AppData\Local\Temp\073731fa5a5ef41b39784ec7db9846f1286d7000add6c0b5dd20357c81e23456.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2864
-