Overview
overview
10Static
static
3036028e386...a7.exe
windows10-2004-x64
100f5fae4716...8d.exe
windows7-x64
30f5fae4716...8d.exe
windows10-2004-x64
101998a377c7...11.exe
windows7-x64
31998a377c7...11.exe
windows10-2004-x64
102b559f1c51...29.exe
windows10-2004-x64
102d1e7e578c...8f.exe
windows7-x64
32d1e7e578c...8f.exe
windows10-2004-x64
1052d5102aa9...ea.exe
windows7-x64
352d5102aa9...ea.exe
windows10-2004-x64
105365362210...13.exe
windows10-2004-x64
105460a1d2c8...37.exe
windows7-x64
105460a1d2c8...37.exe
windows10-2004-x64
105eba1ca0e7...01.exe
windows10-2004-x64
1069b4a94473...6c.exe
windows10-2004-x64
107b7ce936fd...c9.exe
windows10-2004-x64
1082e97b51ca...5f.exe
windows10-2004-x64
10841ea03e18...82.exe
windows10-2004-x64
109b8496e95e...b6.exe
windows10-2004-x64
10bd06bfc269...a3.exe
windows10-2004-x64
10d77888ac75...7b.exe
windows10-2004-x64
10eadc8b7eba...10.exe
windows7-x64
3eadc8b7eba...10.exe
windows10-2004-x64
10ef11bf7b35...d4.exe
windows10-2004-x64
10f0d33c78b4...aa.exe
windows10-2004-x64
10f5c518fe92...4b.exe
windows10-2004-x64
10Analysis
-
max time kernel
127s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
036028e38619a2b41891058cbbec38bbd4ebcfca4ce732fb7db9ad8f372c62a7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0f5fae471624fdc2019d0988b658e0832f13a78b6b310cc8c3c1314c3e0c9f8d.exe
Resource
win7-20231129-en
Behavioral task
behavioral3
Sample
0f5fae471624fdc2019d0988b658e0832f13a78b6b310cc8c3c1314c3e0c9f8d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
1998a377c7bb1ac8d7d9ef4fdd72c4bc6479d87263d40908ca9ea76e5f8f2011.exe
Resource
win7-20240419-en
Behavioral task
behavioral5
Sample
1998a377c7bb1ac8d7d9ef4fdd72c4bc6479d87263d40908ca9ea76e5f8f2011.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2b559f1c510907c1a260b6482b36dce3ba603f08fd80d98ee793787a12104d29.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
52d5102aa94d913408cacb8480a5007f4757bac252d6379b467616eb62442eea.exe
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
52d5102aa94d913408cacb8480a5007f4757bac252d6379b467616eb62442eea.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
536536221030ca60a298f443a202be11047ecd20614f20fb85ec8e3b3915e013.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5460a1d2c84823a33909daab1fdc811ef8902f88377e1cf46112a9d0cdce6e37.exe
Resource
win7-20240215-en
Behavioral task
behavioral13
Sample
5460a1d2c84823a33909daab1fdc811ef8902f88377e1cf46112a9d0cdce6e37.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
5eba1ca0e7f43344f323005e13fa132f591c4f904c89b0c249ed3226ebd05e01.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
69b4a9447365c1cc607cb7e8de4957fcb1ce9841892d9533740403ef7e5af76c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
7b7ce936fd017fb3d3de8552a69b50012fdf9778cf317ec09212df4830d993c9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
82e97b51cae4985f5a2abc5bbe0fe4c23fb25fa8072e45d5e34ec789cb7fcc5f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
841ea03e181082fcf7f5533397a6731021c045058047518f2795b78fd69dda82.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
9b8496e95efc2095012f46230bd3642a47e89c4a73886f41db8e991f7fa863b6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
bd06bfc2696394e32e12dc7d9c3585842b78bfbdc24f4157679058145abb22a3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
d77888ac75d20228b7b7d9e6605425cfb9f51ecf0f39863b19981b1598b3a57b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe
Resource
win7-20240215-en
Behavioral task
behavioral23
Sample
eadc8b7eba6e15614161bb91b8de6cff4d56f767901f6aceb9baed7b0fe0b110.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
ef11bf7b35a28054917643092a94f68ccdbc57cd68005df66e6d81a0d2d012d4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
f0d33c78b4822415ef8b626889ef19e5538cc85e78b11afdd7a1e3aa9b84b8aa.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
f5c518fe92fb2a2cb7e24aef95c0ce906e790b67bbc704f3311706b11b6a7d4b.exe
Resource
win10v2004-20240508-en
General
-
Target
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
-
Size
315KB
-
MD5
3d4c73f2d10c4ea03e9f55af41a02d7f
-
SHA1
e9f70b120dbab724b88c37161e5df5d8607d7500
-
SHA256
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f
-
SHA512
05122b99c10edc0ea4b69f471daf0ce182268d505166e05a69757016f7f87b5e031911c8efd0e6722691b236df5bf2bef74f7a315d9c6c2c6d1e363bf9d98f27
-
SSDEEP
6144:rI9pI60nbM8uPZy3+8KID2YuDUtMXVgbhAZdxldn+kXHS:s9+60nbnuNYV2glAnjJZHS
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral8/memory/1228-1-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 19 pastebin.com 34 pastebin.com 39 pastebin.com 45 pastebin.com 46 pastebin.com 18 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2160 set thread context of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1228 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1228 RegAsm.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2160 wrote to memory of 4816 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 85 PID 2160 wrote to memory of 4816 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 85 PID 2160 wrote to memory of 4816 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 85 PID 2160 wrote to memory of 3740 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 86 PID 2160 wrote to memory of 3740 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 86 PID 2160 wrote to memory of 3740 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 86 PID 2160 wrote to memory of 3556 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 87 PID 2160 wrote to memory of 3556 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 87 PID 2160 wrote to memory of 3556 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 87 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 2160 wrote to memory of 1228 2160 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe"C:\Users\Admin\AppData\Local\Temp\2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:3556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-