Overview
overview
10Static
static
10G K M 9 5.rar
windows7-x64
1G K M 9 5.rar
windows10-2004-x64
10G K M 9 5/Client.exe
windows7-x64
1G K M 9 5/Client.exe
windows10-2004-x64
3G K M 9 5...nu.exe
windows7-x64
7G K M 9 5...nu.exe
windows10-2004-x64
10G K M 9 5/ai.cfg
windows7-x64
3G K M 9 5/ai.cfg
windows10-2004-x64
3G K M 9 5/cacert.pem
windows7-x64
3G K M 9 5/cacert.pem
windows10-2004-x64
3G K M 9 5/config.vdf
windows7-x64
3G K M 9 5/config.vdf
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2024 16:13
Behavioral task
behavioral1
Sample
G K M 9 5.rar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
G K M 9 5.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
G K M 9 5/Client.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
G K M 9 5/Client.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
G K M 9 5/GTA 5 Mod Menu.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
G K M 9 5/GTA 5 Mod Menu.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
G K M 9 5/ai.cfg
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
G K M 9 5/ai.cfg
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
G K M 9 5/cacert.pem
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
G K M 9 5/cacert.pem
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
G K M 9 5/config.vdf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
G K M 9 5/config.vdf
Resource
win10v2004-20241007-en
General
-
Target
G K M 9 5/GTA 5 Mod Menu.exe
-
Size
312KB
-
MD5
46796db8acd3ff52d5daa757a0acc12d
-
SHA1
090afe3863790f1e8d9420309538aa5fa846b29d
-
SHA256
b38f4158c414aace2b77f2743822d2b05b1b456f4b339192c48804fdae25a184
-
SHA512
5b3647b1f2963177513f5a336563e3a8563fe4e6d1c8e00ad4e554f298fca03c200f99a384b24672daed897bed9eef15442dd99afacd5e9992dd27d053f151bb
-
SSDEEP
6144:z6Tz42be3YdQ69bI3aG7ziKyTcQsH9nw5DIOoUX+WXvC1OELkRue:x2YYdxbjPKyTBsFUMJUXf5ELkRue
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral6/memory/3684-10-0x0000000000530000-0x0000000000591000-memory.dmp family_redline behavioral6/memory/3684-14-0x0000000000530000-0x0000000000582000-memory.dmp family_redline -
Loads dropped DLL 1 IoCs
pid Process 5084 GTA 5 Mod Menu.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5084 set thread context of 3684 5084 GTA 5 Mod Menu.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GTA 5 Mod Menu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3684 MSBuild.exe 3684 MSBuild.exe 3684 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3684 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90 PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90 PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90 PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90 PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90 PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90 PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90 PID 5084 wrote to memory of 3684 5084 GTA 5 Mod Menu.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\G K M 9 5\GTA 5 Mod Menu.exe"C:\Users\Admin\AppData\Local\Temp\G K M 9 5\GTA 5 Mod Menu.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
572KB
MD51a3e6dcd6b446b86f6cc2c11efe0bf35
SHA139d1b7a080d0d8149b68ac7a459a7b8d512204cd
SHA256d64e6e381b5341fd164b2bd8435dce7db1f622ea947242e96ba5696eb0095b5b
SHA512769982e0c23aecd622c6efd77773c8836325fe3a71e9e8cc33cc956e4ae23811f1a82d8dc7406a3fc3405b83656fba670334297f3414d0f708d8438d85112814