Overview
overview
10Static
static
30314c3cf58...62.exe
windows10-2004-x64
10142ed11f80...59.exe
windows10-2004-x64
101f54336cee...4f.exe
windows10-2004-x64
102470f02746...37.exe
windows10-2004-x64
10357dca1dd0...e2.exe
windows7-x64
10357dca1dd0...e2.exe
windows10-2004-x64
10367729c840...03.exe
windows10-2004-x64
103ae8cc733e...e3.exe
windows10-2004-x64
103ff87c5bd0...30.exe
windows10-2004-x64
104157cda315...a6.exe
windows10-2004-x64
105f318080c6...ea.exe
windows10-2004-x64
10620f9ee1b4...8f.exe
windows10-2004-x64
106817354347...3a.exe
windows10-2004-x64
10753cdc12b9...91.exe
windows10-2004-x64
10a4215d26b6...74.exe
windows10-2004-x64
10a4375e040f...82.exe
windows10-2004-x64
10a619ae77d5...2e.exe
windows10-2004-x64
10aaab139650...12.exe
windows10-2004-x64
10aefec08eba...49.exe
windows10-2004-x64
10d12f5fa25c...70.exe
windows10-2004-x64
7e5b42981fd...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
137s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
0314c3cf5875f5a348b62f28e53ec17a9180933fb126d66b7184ebbc62e3c362.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
142ed11f8044b70abc93823879852d70e03f8fdb2b557dd5db7da572a6b40d59.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
1f54336ceed1489c1501366db5c3d0173f045faa248587b9e1d9d3669f84114f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2470f02746e0ace28b3f21135e43ca5574a20964c1ebe76b4d37e025bc74cf37.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
367729c84050746eb20cd233e6b8d8cfe0625110da6e43f4b4c486aa19d08103.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3ae8cc733ec108080a1919852f9eed660c71dff454329a044b21af12ce8fa4e3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
3ff87c5bd0d476dfc954d3706672474698d1e412030e6189e037c2474b97b730.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
4157cda3159c7d2c99d18138d2e023dd1d821d09ae77e78901a80b26492981a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5f318080c6c0aef583c575f49bd61e9b4e8b6784f4c52b512e9c07090e4cedea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
620f9ee1b442855f9904f5108cf7185b16d0acbacad9aaa076f02e0ffd4f588f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
68173543479d737f5e883a0bf3bd569d09813666a895a805fd53a18f3a96df3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
753cdc12b984ece991f2018329d37985ee627640895e2d9b9a43a13a6dd6fb91.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
a4215d26b6f0c0e1bf7e0f7a14e39744684399db4b301d328c8f7df9ca1c0b74.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
a4375e040f13128a4dc747d845dd82b7204008c71beb526483b369eea30d2582.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a619ae77d542717361e631ceb6fe3fab295af4ccef45ae4774b92a9355b6bb2e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
aaab139650da2e31907d608a912b0aa66038a21c8d946e300a44ab21b51c2c12.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
aefec08ebaf1c6b975dbf83df5257e52d7efcbaf569ea4b633cec392af828049.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
d12f5fa25c8ef0ae322be4daa1b08acf499c9d1be60c2f8d6f6b5a65c28f0a70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e5b42981fd5d352478cd9e79d582bc92295cb43d3d32dfd59e84008eb4216c65.exe
Resource
win10v2004-20240426-en
General
-
Target
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe
-
Size
1.1MB
-
MD5
0c3c542480b366c4937a6a352723cff2
-
SHA1
7e4a1a89113a6fe0eb21e7b0d5640933095d035c
-
SHA256
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2
-
SHA512
6f922448fb2512643a14154e6f6b6aaf6cac4a1af9cad3e818ad87b5cad4d56beb1a0848b005c75938853f0d74f6bd094332f695da0bda9e55997a7b1c2d032f
-
SSDEEP
12288:2Q1Ud1yTt0OFYtMeTVRq6zlXO4iIEbJGHaKwCugkgqaWxFnE+iOPW5kYg3meJ:Gdgh0OFYtMeTVRfBxIJGwcunE+IkYA
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral5/memory/2112-7-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral5/memory/2112-9-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral5/memory/2112-5-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral5/memory/2112-3-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral5/memory/2112-2-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exedescription pid process target process PID 2244 set thread context of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exedescription pid process target process PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe PID 2244 wrote to memory of 2112 2244 357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe"C:\Users\Admin\AppData\Local\Temp\357dca1dd0b140db9468cb0bea91da2504a032397de5a581bd04f96d59e430e2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2112