Overview
overview
10Static
static
3036028e386...a7.exe
windows10-2004-x64
100f5fae4716...8d.exe
windows7-x64
30f5fae4716...8d.exe
windows10-2004-x64
101998a377c7...11.exe
windows7-x64
31998a377c7...11.exe
windows10-2004-x64
102b559f1c51...29.exe
windows10-2004-x64
102d1e7e578c...8f.exe
windows7-x64
32d1e7e578c...8f.exe
windows10-2004-x64
1052d5102aa9...ea.exe
windows7-x64
352d5102aa9...ea.exe
windows10-2004-x64
105365362210...13.exe
windows10-2004-x64
105460a1d2c8...37.exe
windows7-x64
105460a1d2c8...37.exe
windows10-2004-x64
105eba1ca0e7...01.exe
windows10-2004-x64
1069b4a94473...6c.exe
windows10-2004-x64
107b7ce936fd...c9.exe
windows10-2004-x64
1082e97b51ca...5f.exe
windows10-2004-x64
10841ea03e18...82.exe
windows10-2004-x64
109b8496e95e...b6.exe
windows10-2004-x64
10bd06bfc269...a3.exe
windows10-2004-x64
10d77888ac75...7b.exe
windows10-2004-x64
10eadc8b7eba...10.exe
windows7-x64
3eadc8b7eba...10.exe
windows10-2004-x64
10ef11bf7b35...d4.exe
windows10-2004-x64
10f0d33c78b4...aa.exe
windows10-2004-x64
10f5c518fe92...4b.exe
windows10-2004-x64
10Analysis
-
max time kernel
130s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
036028e38619a2b41891058cbbec38bbd4ebcfca4ce732fb7db9ad8f372c62a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f5fae471624fdc2019d0988b658e0832f13a78b6b310cc8c3c1314c3e0c9f8d.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
0f5fae471624fdc2019d0988b658e0832f13a78b6b310cc8c3c1314c3e0c9f8d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1998a377c7bb1ac8d7d9ef4fdd72c4bc6479d87263d40908ca9ea76e5f8f2011.exe
Resource
win7-20240419-en
Behavioral task
behavioral5
Sample
1998a377c7bb1ac8d7d9ef4fdd72c4bc6479d87263d40908ca9ea76e5f8f2011.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2b559f1c510907c1a260b6482b36dce3ba603f08fd80d98ee793787a12104d29.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
52d5102aa94d913408cacb8480a5007f4757bac252d6379b467616eb62442eea.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
52d5102aa94d913408cacb8480a5007f4757bac252d6379b467616eb62442eea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
536536221030ca60a298f443a202be11047ecd20614f20fb85ec8e3b3915e013.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5460a1d2c84823a33909daab1fdc811ef8902f88377e1cf46112a9d0cdce6e37.exe
Resource
win7-20240215-en
Behavioral task
behavioral13
Sample
5460a1d2c84823a33909daab1fdc811ef8902f88377e1cf46112a9d0cdce6e37.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
5eba1ca0e7f43344f323005e13fa132f591c4f904c89b0c249ed3226ebd05e01.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
69b4a9447365c1cc607cb7e8de4957fcb1ce9841892d9533740403ef7e5af76c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
7b7ce936fd017fb3d3de8552a69b50012fdf9778cf317ec09212df4830d993c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
82e97b51cae4985f5a2abc5bbe0fe4c23fb25fa8072e45d5e34ec789cb7fcc5f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
841ea03e181082fcf7f5533397a6731021c045058047518f2795b78fd69dda82.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
9b8496e95efc2095012f46230bd3642a47e89c4a73886f41db8e991f7fa863b6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
bd06bfc2696394e32e12dc7d9c3585842b78bfbdc24f4157679058145abb22a3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
d77888ac75d20228b7b7d9e6605425cfb9f51ecf0f39863b19981b1598b3a57b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe
Resource
win7-20240215-en
Behavioral task
behavioral23
Sample
eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
ef11bf7b35a28054917643092a94f68ccdbc57cd68005df66e6d81a0d2d012d4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
f0d33c78b4822415ef8b626889ef19e5538cc85e78b11afdd7a1e3aa9b84b8aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
f5c518fe92fb2a2cb7e24aef95c0ce906e790b67bbc704f3311706b11b6a7d4b.exe
Resource
win10v2004-20240508-en
General
-
Target
eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe
-
Size
333KB
-
MD5
3c77db8ee7d08d76b14c5fc09137df15
-
SHA1
cc7f65cf6094c1cef4533d73b969a3c0a719d5ff
-
SHA256
eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110
-
SHA512
6c9d537c77b713356587a42fc487979058cd63b6d428802565aa9ac6f83beccd5fb23ed96ed32f09e07573c05e3018b1d96515f0762a9c5c0fe8b8ba44a3f288
-
SSDEEP
6144:e1RwZfFQDOioMvzATd5W0jbSXRYygh2qjjjjjjjJ42J2VfdweP4ql732W1sV+0Xp:e/zDOioMvzA+iygAqjjjjjjjJafKxI3W
Malware Config
Extracted
redline
7001210066
https://pastebin.com/raw/KE5Mft0T
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral23/memory/4332-2-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 5 pastebin.com 6 pastebin.com 35 pastebin.com 69 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3328 set thread context of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4332 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4332 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84 PID 3328 wrote to memory of 4332 3328 eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe"C:\Users\Admin\AppData\Local\Temp\eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4332
-