Overview
overview
10Static
static
31668096fbf...95.exe
windows10-2004-x64
102159151861...2d.exe
windows10-2004-x64
1022c5bd0a3e...19.exe
windows10-2004-x64
102a0ae333a9...1a.exe
windows7-x64
32a0ae333a9...1a.exe
windows10-2004-x64
104f86d48b3d...df.exe
windows10-2004-x64
1053ecffef24...36.exe
windows10-2004-x64
1075ccbf328f...af.exe
windows10-2004-x64
1077ba6e9303...c2.exe
windows10-2004-x64
10798aee8abb...5b.exe
windows10-2004-x64
1079eaddd1dc...70.exe
windows10-2004-x64
1080ada740eb...52.exe
windows10-2004-x64
109e3cf610e6...f0.exe
windows7-x64
109e3cf610e6...f0.exe
windows10-2004-x64
10a5bd0160df...49.exe
windows10-2004-x64
10aee53fccee...da.exe
windows10-2004-x64
10af9c5ff480...30.exe
windows7-x64
3af9c5ff480...30.exe
windows10-2004-x64
10bfe644d3bd...29.exe
windows10-2004-x64
10ca9f078739...a4.exe
windows10-2004-x64
10dda511575f...2f.exe
windows10-2004-x64
10ff541e0752...bb.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-05-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
1668096fbfea278168a053bdb5fffa557e8bf8afd9b1ea6f4de43adb16c9cd95.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2159151861e461f2ae831fef44ef4a519defe4741536ef19cc47163f7504ce2d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
22c5bd0a3e3c03e512f45c0ebd81b9cf7695279360a1c40cec90cf3efea5f219.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a.exe
Resource
win7-20240508-en
Behavioral task
behavioral5
Sample
2a0ae333a9b72768e8a05e7ebbfe4b15cf581f8c08129c0639aeed58eaf7901a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4f86d48b3d0bdaa6f4d6e224cb3d78d45d0e5ff02992de35aad4053a747106df.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
53ecffef24ddea22780ff63e0224bd9c1bf9d8533760949fff138bd5c432ce36.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
75ccbf328f1e4ec3537ebd63e6afcf1b951f8765d8b1c734b87a7073333332af.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
77ba6e93030c34c0c9c7b7ce05174d89515be6f64d93ad8fd6c5a7efd813f4c2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
798aee8abbe13acdcba7ded2507144abfb3a7bdb36dfad1f88ebd752af5e0c5b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
79eaddd1dc15f0cdf5e503c8eff40a9cabfc9aca470a302c9e868d65a3670c70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
80ada740ebfd0573ea8825fc2b499a0d326897ebf254fc015852802a58a05452.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
a5bd0160df71694767fdadc369e0582970a1182d88c7fea774ca4d3bdb503e49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
aee53fccee33b73dab9491356e6eb50d71b3b380ca589b649b6ec63ff792c3da.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
af9c5ff480fec8f9f7f8c274ed08c18a4e5a894eec2eb3577031e60657b87b30.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
af9c5ff480fec8f9f7f8c274ed08c18a4e5a894eec2eb3577031e60657b87b30.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
bfe644d3bd33f0f28361b0b64f6fba6444cbce7ffc0fb0746a6226305bffb229.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
ca9f07873920ecd0518ecf148ae1351a8ecb3ce1fe033aa44b45de07f87202a4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
dda511575fe2d4e8cc7e7dfbf500a529cbd2a5acc24299b8217d603401322c2f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
ff541e0752957750759a393b41c2885b8177a2e7daf8234bf11068c537e215bb.exe
Resource
win10v2004-20240508-en
General
-
Target
9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe
-
Size
1.1MB
-
MD5
74528821220b4f1ffd8a0c91852abd0f
-
SHA1
2e9219f3fdb0e6341840bf9c58cfc4fca352338b
-
SHA256
9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0
-
SHA512
27769622b4c8807c63c8ebee8e166f1fd46fa5cb606f0b54df9fa3f6364ea684011e0e5f749546ffc4c530959deb784c99e52aef2e93228889d9e3225a35577e
-
SSDEEP
12288:9AxJ1c9psKtwW7IhuOXUPJuI85i8gTohuVohatk6j0O/H9lm0:9i1c9psKtwW7m3iM5i8VKtvj0GH9l
Malware Config
Extracted
redline
breha
77.91.124.55:19071
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral13/memory/1956-3-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral13/memory/1956-2-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral13/memory/1956-9-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral13/memory/1956-7-0x0000000000400000-0x000000000043E000-memory.dmp family_redline behavioral13/memory/1956-6-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exedescription pid Process procid_target PID 2212 set thread context of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2944 2212 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exedescription pid Process procid_target PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 1956 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 29 PID 2212 wrote to memory of 2944 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 30 PID 2212 wrote to memory of 2944 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 30 PID 2212 wrote to memory of 2944 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 30 PID 2212 wrote to memory of 2944 2212 9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe"C:\Users\Admin\AppData\Local\Temp\9e3cf610e66102e164150efe5b2dee630cac04b4e4e29770c91180e956b39df0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 522⤵
- Program crash
PID:2944
-