Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe
Resource
win10v2004-20240802-en
General
-
Target
204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe
-
Size
1.5MB
-
MD5
2a601bbfbfc987186371e75c2d70ef4e
-
SHA1
791cd6bdac91a6797279413dc2a53770502380ca
-
SHA256
204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5
-
SHA512
1c3c6a4da8448fecaf917ca586ee6e069733c16e3477734b7548863dc81aa9ef9112a648fd38e3ea527766a19a9aac925c3a4d3531784ae9111386721bc79f3e
-
SSDEEP
24576:4pIaZk3zA3CZfN0rKOWN8O3b0/3GhiwUkWlfBP3:4eSk303UN0rKOWN8O3b0/3GhiwUkWlfZ
Malware Config
Extracted
redline
dasad
147.45.47.53:25084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/932-10-0x0000000000140000-0x0000000000192000-memory.dmp family_redline -
Loads dropped DLL 1 IoCs
pid Process 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85 PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85 PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85 PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85 PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85 PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85 PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85 PID 1820 wrote to memory of 932 1820 204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe"C:\Users\Admin\AppData\Local\Temp\204e8268d98a3584e7fda52820025c6b681fd5dca6da726512d3ea97fb4510d5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
519KB
MD53890670c65b1527cf8afba9ff1bee930
SHA1010961ead5ad7d49d200ccf9da59e6742fe9e20e
SHA256526ab1133f4714c76a8ea39d1ea652b148af956e357a8644e9d063071782c0d1
SHA5124acba818835f1014d7c1b54732760db361e5c5966980dcbbf15ac1a0c6c0467e56988cdc99dba5c41b427f24383857de69a5ccd34e907481575e863e007276bf