Analysis
-
max time kernel
106s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-08-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
j5520135.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
j5520135.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
x2665667.exe
Resource
win10v2004-20240802-en
General
-
Target
j5520135.exe
-
Size
392KB
-
MD5
a02932183eda07a8563668fc0519e6ee
-
SHA1
aece4bbc60a6d479572f4cc184fdc3275a50c0ba
-
SHA256
faabc4c005f7afaaa638fcdc48b09e8b3a269baa13e2599fa699ba02a7e3fbb6
-
SHA512
d60192997fe9fa869d1d9557acedff766329a0267c37d74f3fbe9682f13ac87bf8c9b3146b96a0ebb466554c49dafe34192ed6c3d685c5021306eb0332210db0
-
SSDEEP
6144:jefcF7qOXciQ3xFF1kCaX4z4AOAnDXT3C0XJ2BMSo5apW58fi:ifc1tXcve44unisJkIz8fi
Malware Config
Extracted
redline
monik
77.91.124.82:19071
-
auth_value
da7d9ea0878f5901f1f8319d34bdccea
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1944-2-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1944-5-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1944-3-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1944-8-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral1/memory/1944-9-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2984 set thread context of 1944 2984 j5520135.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j5520135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31 PID 2984 wrote to memory of 1944 2984 j5520135.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\j5520135.exe"C:\Users\Admin\AppData\Local\Temp\j5520135.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1944
-