Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20240802-en
General
-
Target
Loader.exe
-
Size
1.4MB
-
MD5
b524fe05b77d92787cd7e645f187a748
-
SHA1
e1c2d5b8c48521826550cf5c04c5dcc0d7c9914d
-
SHA256
e57f3efaba488d392c66f31883f8d697652093ab73675a05a7f982ea80f5ad82
-
SHA512
7b9113f71956bd4d46772312af6f2bf94cf5dd961064dd072b66306803f50e7af882861e200a4ddf2ce5cbf0ee7f378494844cf0b1c8d5604d6861bce9822ab7
-
SSDEEP
12288:h2SFIaZJvUd2q94IZR0O7/xXSKGOOb1haKbQ3z2jzBSN0FMTz7QOSJB4MDWHDbUn:h2mIaZ68kVLae1Nw1jX2aOfZJipFtYN
Malware Config
Extracted
redline
@LlJakell
185.215.113.22:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3636-10-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Loads dropped DLL 1 IoCs
pid Process 1012 Loader.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3636 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1012 wrote to memory of 3636 1012 Loader.exe 87 PID 1012 wrote to memory of 3636 1012 Loader.exe 87 PID 1012 wrote to memory of 3636 1012 Loader.exe 87 PID 1012 wrote to memory of 3636 1012 Loader.exe 87 PID 1012 wrote to memory of 3636 1012 Loader.exe 87 PID 1012 wrote to memory of 3636 1012 Loader.exe 87 PID 1012 wrote to memory of 3636 1012 Loader.exe 87 PID 1012 wrote to memory of 3636 1012 Loader.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:3636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
516KB
MD5e1c9cb72ba61ed944d9dbd2785c3a632
SHA1d21639072c5d15122278ed366026af399594f45d
SHA2563b4aed1f29db2d857c8a884b4f0a7e154d911cd69902dc1c7c544898386ec238
SHA5120057773bff9145468454b2e26b685b10d0de621a03fd32baaf1600f928f8ec9dccb86f622bc0d8f6b3c082162a9261df2e27a269aa99b209b41f7b9198b6c7e1