Overview
overview
10Static
static
3072894a720...70.exe
windows10-2004-x64
10075e0048e6...e5.exe
windows10-2004-x64
10131b78a330...7b.exe
windows10-2004-x64
1056b0ed98e3...54.exe
windows10-2004-x64
10807255749f...62.exe
windows7-x64
10807255749f...62.exe
windows10-2004-x64
108a8433aeba...ed.exe
windows10-2004-x64
108cae2c42df...9a.exe
windows7-x64
108cae2c42df...9a.exe
windows10-2004-x64
10d730c48963...34.exe
windows10-2004-x64
10e98954290c...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
131s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
075e0048e616f67de702a289e630f2df2651249474b3366d424d5bfefc2071e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
131b78a330f033599e72f43b4c44a4ce16181a4de774a7e0ebc96fe998dea67b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
56b0ed98e3472c3ed4c501f9630c8e00fd98a17a99687541889c257dffc5d254.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
e98954290c7c1115f81a9b91ee8f444cad7f016d85fb2d9b70793e27c9384365.exe
Resource
win10v2004-20240426-en
General
-
Target
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
-
Size
377KB
-
MD5
92c261fc96a068ae2a2835ee27a16f1e
-
SHA1
75e4e65827acaa4e0faa3f42632a53e011bbbd09
-
SHA256
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62
-
SHA512
6a1a360b8719a31d2f83ef4dfee0abae102b55ff67284b65f061fb5afddca17d8e9307d5c240f50127ebc5483d230bfb2d4bd364b2d8fddc5b3c67dd27d5ada9
-
SSDEEP
6144:rB8vGHJfjmufItYYFrIPU88CcRAO6O82BldTjqPQo0y:rB8v8jmufI+YMgJZBlda0y
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
149.202.0.242:31728
-
auth_value
3a050df92d0cf082b2cdaf87863616be
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral5/memory/1724-7-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral5/memory/1724-9-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral5/memory/1724-5-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral5/memory/1724-2-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral5/memory/1724-3-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exedescription pid process target process PID 1924 set thread context of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exedescription pid process target process PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe PID 1924 wrote to memory of 1724 1924 807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe"C:\Users\Admin\AppData\Local\Temp\807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1724
-