Overview
overview
10Static
static
3220f464b76...f3.exe
windows10-2004-x64
102743aa58ac...22.exe
windows7-x64
32743aa58ac...22.exe
windows10-2004-x64
102ce9158850...93.exe
windows10-2004-x64
102d1e7e578c...8f.exe
windows7-x64
32d1e7e578c...8f.exe
windows10-2004-x64
106a183f77b9...7d.exe
windows10-2004-x64
107727481721...74.exe
windows7-x64
37727481721...74.exe
windows10-2004-x64
10951f93d281...f8.exe
windows7-x64
3951f93d281...f8.exe
windows10-2004-x64
109bba18a180...52.exe
windows10-2004-x64
10a467111c1a...4b.exe
windows10-2004-x64
10b6b30a924e...0b.exe
windows10-2004-x64
10bdacff51fa...2b.exe
windows10-2004-x64
10c37c4fe673...eb.exe
windows10-2004-x64
10d0f3f32b61...38.exe
windows7-x64
3d0f3f32b61...38.exe
windows10-2004-x64
10d353176614...e5.exe
windows10-2004-x64
10d49811a818...06.exe
windows7-x64
3d49811a818...06.exe
windows10-2004-x64
10db044599ba...af.exe
windows7-x64
3db044599ba...af.exe
windows10-2004-x64
10e3c9a1721d...3b.exe
windows10-2004-x64
10ea47879989...93.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
220f464b76f6cb53d1ee73c2d90b0ada5c8cc5d2a80bd9d4fed4a544d73721f3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2743aa58ac87e72c969f8baff90a46df51144db6b46e42137bec8f8ffe030422.exe
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
2743aa58ac87e72c969f8baff90a46df51144db6b46e42137bec8f8ffe030422.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
2ce9158850627f9719e666b3f93a1508443159828dcc0aab91110d608c67b893.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6a183f77b983e6c003810991feea77693c5603a5e5ebca149d3e4ecfdcc2827d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
77274817210948a1fbb7d40ad1a99460ad22b9558203091765c377ab9b074874.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
77274817210948a1fbb7d40ad1a99460ad22b9558203091765c377ab9b074874.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
951f93d281b72cbee616455728a3885d88e2ce7083c529de95ab9de3efe14ff8.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
951f93d281b72cbee616455728a3885d88e2ce7083c529de95ab9de3efe14ff8.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
9bba18a18011c572ee6b56cde220be7a07f51e4e0f2cdf0a4ebaf3bd06feca52.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
a467111c1a7dd3af8188b3fd8536d689b84b136a58f62e8366f78d309b1bad4b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b6b30a924e3f969aba356b4a964cb4abb9fddd40a9a6d9068144b799e997a80b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
bdacff51fa5404ce6f24b89ee15c9de1591f3b0671ffcdead018c8136b56522b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
c37c4fe673daf8c4e8e21c607e393cc10eaf650294d08cb4f702da5fa23f0eeb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
d0f3f32b61b9e8c20cd73d28b21a5e034041570a81ffd7bddcd760bc2f8a5538.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
d0f3f32b61b9e8c20cd73d28b21a5e034041570a81ffd7bddcd760bc2f8a5538.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
d353176614b7dd329d9f436d6a34f007c32540fac4c5f4e3f2884d89ed599fe5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d49811a818845606218cd8436043886ebf6fa2d750248ad4f7f09d197c31db06.exe
Resource
win7-20240220-en
Behavioral task
behavioral21
Sample
d49811a818845606218cd8436043886ebf6fa2d750248ad4f7f09d197c31db06.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
db044599ba62c9a98e024ecd1f465c8f39790d7683b22c64327635e0d2c0b4af.exe
Resource
win7-20240215-en
Behavioral task
behavioral23
Sample
db044599ba62c9a98e024ecd1f465c8f39790d7683b22c64327635e0d2c0b4af.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral24
Sample
e3c9a1721d8f0eecf6a7e81b32b9823a4952d636d4930a9cdfae0876cf293d3b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
ea47879989afdae64e6a2fd1bdd521ed8a7eee7611d92cfa24311d7f31d22c93.exe
Resource
win10v2004-20240508-en
General
-
Target
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe
-
Size
315KB
-
MD5
3d4c73f2d10c4ea03e9f55af41a02d7f
-
SHA1
e9f70b120dbab724b88c37161e5df5d8607d7500
-
SHA256
2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f
-
SHA512
05122b99c10edc0ea4b69f471daf0ce182268d505166e05a69757016f7f87b5e031911c8efd0e6722691b236df5bf2bef74f7a315d9c6c2c6d1e363bf9d98f27
-
SSDEEP
6144:rI9pI60nbM8uPZy3+8KID2YuDUtMXVgbhAZdxldn+kXHS:s9+60nbnuNYV2glAnjJZHS
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral6/memory/1152-0-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 47 pastebin.com 69 pastebin.com 18 pastebin.com 19 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4588 set thread context of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1152 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88 PID 4588 wrote to memory of 1152 4588 2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe"C:\Users\Admin\AppData\Local\Temp\2d1e7e578c80b8d8058a776542e88f81546a3603e80751bef11e72c2329d748f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-