Analysis
-
max time kernel
134s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe
Resource
win10v2004-20241007-en
General
-
Target
fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe
-
Size
581KB
-
MD5
ab3882985ecd84d6225d3cbedf7f724b
-
SHA1
fadd76ae1cc77aa997a07f0fcc55897895cb80d0
-
SHA256
cc1c9c49ccd378506232eb07dd0785c4e30aaf05939941e425b10a22dc0e1971
-
SHA512
8734a498280f39546176d774fded2ec003b8283a4065d619bf1cde05093ac26f3226bbe3d1abce3e836c7623c88570cbf0873504afa2566f921ec0ab3ea64adf
-
SSDEEP
12288:HqyQuz/GcTFDCoXBSPU2doUU0B93uIpUQ8I5G:HCuzSPpdo6PkQ8I5
Malware Config
Extracted
redline
1
107.182.129.73:21733
-
auth_value
3a5bb0917495b4312d052a0b8977d2bb
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1620-1-0x00000000001A0000-0x00000000001C0000-memory.dmp family_redline -
Redline family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1648 set thread context of 1620 1648 fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1648 wrote to memory of 1620 1648 fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe 87 PID 1648 wrote to memory of 1620 1648 fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe 87 PID 1648 wrote to memory of 1620 1648 fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe 87 PID 1648 wrote to memory of 1620 1648 fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe 87 PID 1648 wrote to memory of 1620 1648 fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe"C:\Users\Admin\AppData\Local\Temp\fadd76ae1cc77aa997a07f0fcc55897895cb80d0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1620
-