Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 20:14

General

  • Target

    Rustcheatmenu.exe

  • Size

    522KB

  • MD5

    6422484a7040519e373c4819ec0fe78a

  • SHA1

    64907f1b421639c2a7432337c10d61e42daeddfa

  • SHA256

    39437bafe75198623eb0268c0a13cbe6f330cb119aa2cca09eee149801ceeb30

  • SHA512

    4c611918ff4efaeb374b7d75ac882e28c8fe2869ff6822831464627d867199f0ba8d07d70a49a7d6b48860bae1f39ac241993680282df547d4cbc9612486b478

  • SSDEEP

    12288:0CKas9Nm4bVkr5wnk1xwNSYLDZZHyeXj73nAYQeV:0faU3Y2lZHy0rFlV

Malware Config

Extracted

Family

redline

Botnet

@KillerBSC

C2

85.28.47.132:80

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Rustcheatmenu.exe
    "C:\Users\Admin\AppData\Local\Temp\Rustcheatmenu.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:4540
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1776-0-0x0000000000900000-0x0000000000901000-memory.dmp

      Filesize

      4KB

    • memory/4668-1-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/4668-2-0x000000007447E000-0x000000007447F000-memory.dmp

      Filesize

      4KB

    • memory/4668-3-0x0000000005F70000-0x0000000006514000-memory.dmp

      Filesize

      5.6MB

    • memory/4668-4-0x0000000005A60000-0x0000000005AF2000-memory.dmp

      Filesize

      584KB

    • memory/4668-5-0x0000000005A30000-0x0000000005A3A000-memory.dmp

      Filesize

      40KB

    • memory/4668-6-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/4668-7-0x0000000006F40000-0x0000000007558000-memory.dmp

      Filesize

      6.1MB

    • memory/4668-8-0x0000000006B20000-0x0000000006C2A000-memory.dmp

      Filesize

      1.0MB

    • memory/4668-9-0x0000000006A90000-0x0000000006AA2000-memory.dmp

      Filesize

      72KB

    • memory/4668-10-0x0000000006C30000-0x0000000006C6C000-memory.dmp

      Filesize

      240KB

    • memory/4668-11-0x0000000006DB0000-0x0000000006DFC000-memory.dmp

      Filesize

      304KB

    • memory/4668-12-0x0000000008C00000-0x0000000008C66000-memory.dmp

      Filesize

      408KB

    • memory/4668-13-0x0000000008ED0000-0x0000000008F20000-memory.dmp

      Filesize

      320KB

    • memory/4668-14-0x0000000009320000-0x00000000094E2000-memory.dmp

      Filesize

      1.8MB

    • memory/4668-15-0x0000000009C20000-0x000000000A14C000-memory.dmp

      Filesize

      5.2MB

    • memory/4668-17-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB