Overview
overview
10Static
static
32ac9284d26...2e.exe
windows10-2004-x64
1046054179cb...c6.exe
windows10-2004-x64
74da066114f...cb.exe
windows10-2004-x64
1052fd0a92cd...e8.exe
windows10-2004-x64
1064b627f8b2...dc.exe
windows10-2004-x64
107343af2588...64.exe
windows10-2004-x64
10913938eed9...a6.exe
windows10-2004-x64
10963caa90e2...8b.exe
windows7-x64
10963caa90e2...8b.exe
windows10-2004-x64
10993b22cd0e...bb.exe
windows10-2004-x64
109e4d940a32...56.exe
windows10-2004-x64
10b093b62b3c...3a.exe
windows10-2004-x64
10b60133d8c6...87.exe
windows10-2004-x64
10b88e4acc8b...70.exe
windows10-2004-x64
10b9e66aabb2...21.exe
windows10-2004-x64
10ba66c3ba45...93.exe
windows10-2004-x64
10ca4dd99dd7...5e.exe
windows10-2004-x64
10da83df46c9...bd.exe
windows7-x64
10da83df46c9...bd.exe
windows10-2004-x64
10e40b073703...73.exe
windows10-2004-x64
10e90aeb6eb5...2c.exe
windows10-2004-x64
10fa7f367abb...e6.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
2ac9284d26694cef6e105c1d2811bfa8f9f4ad619164ac6068f85f79fdc93c2e.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
46054179cb2d9b509f8a1029b4d1b357f32a91ab0af933d26deeaaae266db1c6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
4da066114fff05c7f108852d67f4151134d789b0b406c964771aa61acdaf28cb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
52fd0a92cd193f49dd929ce5ff9680fad847ee599a1bcf1b3d85bf92a28149e8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
64b627f8b2e8627a31f5ccb6fd6d30c39a1cd72c7bf4eb689910c2ce78d646dc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
7343af258896b872f85a24f931bee9fc4d58298b4225602c4a002334ee484164.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
913938eed99c7cecb554ea106699cb053edd02b8f457631f7e810dff3f3bbfa6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe
Resource
win7-20240215-en
Behavioral task
behavioral9
Sample
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
993b22cd0edfed671f3110dc80dd02946e17220bbeed7d83c7fc5abec04c3dbb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
9e4d940a325e9b72d46353fc864673d69a691a5708c222a2124623dbb1d29056.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
b093b62b3c10bec126678999d01ec29829b6cd97661fc6492cc56c7a9503c93a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
b60133d8c678905dd786ba8cd2dfcb7357ea3c1adea3c733147a681537f91987.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
b88e4acc8b5bc7d78960ffffe70c54c5b2d30e7010e22306b70f7cc6b4629370.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
b9e66aabb221e3e3118a47d09299a0e6940e137a234b31c5a1aa3a72d2d96121.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
ba66c3ba45ca9b8976288e133180837ff25f0e016b2c79dc3945bba768329c93.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
ca4dd99dd7103ec05d0d43690019a1de3a654140e64a44ae16dc101ba0a5895e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
da83df46c9a090a82fe6e6cb5ea91ec010777168eccd438ca33ac3ac723c9ebd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
e40b0737038122a56b3737a041c631f84c0e0d0fd97111d05f689d73301a2e73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e90aeb6eb581fc03df5540f7bbbc8cb887bb885815085075594020a3e9b2ec2c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
fa7f367abb26ee1daca84a0703ee7110f42a619fee072651c4f5efff7f782ae6.exe
Resource
win10v2004-20240508-en
General
-
Target
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe
-
Size
493KB
-
MD5
05d368231aa5fb5e92404aa8c8a8f25b
-
SHA1
507d0aceed0d6b8204bbdd5d789fb464c32b1158
-
SHA256
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b
-
SHA512
c4eb44baf7fa479b769c249d1231e1ca5b3a3614e4b1e35e562206fe5bc6da56c77faa06ba1d983fa47d1f080f56609cc44ca921fb51eda4a9947e3fb717d27d
-
SSDEEP
6144:o3nNKoPE2gZB/6fZOE0EUAOO1kKmxBuaLyvJTpkIroVLbyTy//55/766666qZ8x:6nNTPE2CEgRKuuaWvJVFro4TW/Cx
Malware Config
Extracted
redline
horda
194.49.94.152:19053
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral8/memory/2940-3-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral8/memory/2940-2-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral8/memory/2940-9-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral8/memory/2940-7-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral8/memory/2940-5-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exedescription pid process target process PID 2904 set thread context of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exedescription pid process target process PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe PID 2904 wrote to memory of 2940 2904 963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe"C:\Users\Admin\AppData\Local\Temp\963caa90e29c238b3f03e62737f229b75eea1ca9df309b4f2016fe5bf9afee8b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2940