Overview
overview
10Static
static
3FORTNITECHEAT.exe
windows7-x64
10FORTNITECHEAT.exe
windows10-2004-x64
10Installer2.exe
windows7-x64
10Installer2.exe
windows10-2004-x64
10Zeus.exe
windows7-x64
10Zeus.exe
windows10-2004-x64
10installer.exe
windows7-x64
10installer.exe
windows10-2004-x64
10lnjector.exe
windows7-x64
10lnjector.exe
windows10-2004-x64
10setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
FORTNITECHEAT.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FORTNITECHEAT.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Installer2.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Installer2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Zeus.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Zeus.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
installer.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
lnjector.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
lnjector.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
setup.exe
Resource
win7-20241023-en
General
-
Target
lnjector.exe
-
Size
500.5MB
-
MD5
56cb97e07b3367190cea9bb199bc152e
-
SHA1
cf8e2cb67cfd695ce46126a086ad970818330cda
-
SHA256
01af0abb5a482d088222df1a4b4035ef86f643bc2537b161227bab8715dea6bb
-
SHA512
0cf64f84e628e035b284a91fae51708cf25b78a075692df26211c74f2379fe72612bba98310bd540967ba79f570ae93c44b48505c5a324d05257c61829c7e042
-
SSDEEP
12288:DoqTPMr/tw5cy8TOtn2C7LwUDEzM54tESMCgL:DoqTUr/tw5cy2C77+aZ5
Malware Config
Extracted
redline
176.113.115.7:2883
-
auth_value
67bd855e4ce847859f82655be579f403
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral10/memory/4568-1-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Redline family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4356 set thread context of 4568 4356 lnjector.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 3980 4356 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lnjector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4568 4356 lnjector.exe 89 PID 4356 wrote to memory of 4568 4356 lnjector.exe 89 PID 4356 wrote to memory of 4568 4356 lnjector.exe 89 PID 4356 wrote to memory of 4568 4356 lnjector.exe 89 PID 4356 wrote to memory of 4568 4356 lnjector.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\lnjector.exe"C:\Users\Admin\AppData\Local\Temp\lnjector.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4356 -s 1522⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4356 -ip 43561⤵PID:1584