Overview
overview
10Static
static
10Bird.exe
windows7-x64
10Bird.exe
windows10-2004-x64
10CSGO FREE HACK.exe
windows7-x64
10CSGO FREE HACK.exe
windows10-2004-x64
10CSGO FREEHACK.exe
windows7-x64
3CSGO FREEHACK.exe
windows10-2004-x64
3CSGhost-v4.1.exe
windows7-x64
8CSGhost-v4.1.exe
windows10-2004-x64
10Install.exe
windows7-x64
10Install.exe
windows10-2004-x64
10Installer.exe
windows7-x64
10Installer.exe
windows10-2004-x64
10Installer2.exe
windows7-x64
10Installer2.exe
windows10-2004-x64
10Kiddions Mod MENU.exe
windows7-x64
7Kiddions Mod MENU.exe
windows10-2004-x64
7Minecraft_v4.5.exe
windows7-x64
10Minecraft_v4.5.exe
windows10-2004-x64
10Vape Crack.exe
windows7-x64
10Vape Crack.exe
windows10-2004-x64
10Vape Patch.exe
windows7-x64
10Vape Patch.exe
windows10-2004-x64
10Vape_V4.exe
windows7-x64
10Vape_V4.exe
windows10-2004-x64
10launcher.exe
windows7-x64
10launcher.exe
windows10-2004-x64
10nixware crack.exe
windows7-x64
3nixware crack.exe
windows10-2004-x64
3Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 16:28
Behavioral task
behavioral1
Sample
Bird.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Bird.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CSGO FREE HACK.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CSGO FREE HACK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
CSGO FREEHACK.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
CSGO FREEHACK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
CSGhost-v4.1.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
CSGhost-v4.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Install.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Installer.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Installer2.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Installer2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Kiddions Mod MENU.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Kiddions Mod MENU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Minecraft_v4.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Minecraft_v4.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Vape Crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Vape Crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Vape Patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Vape Patch.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Vape_V4.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Vape_V4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
launcher.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
nixware crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
nixware crack.exe
Resource
win10v2004-20241007-en
General
-
Target
Installer2.exe
-
Size
448KB
-
MD5
e913219e5f91222d184ecc758088ef02
-
SHA1
e3e9a88a115f3661d55655a096b013f192b93a05
-
SHA256
9dc934f7f22e493a1c1d97107edc85ccce4e1be155b2cc038be8d9a57b2e430f
-
SHA512
879406edaaf7b4956c535c93d067f485e660309ffa7d9a40b1de4eac0fe6e59c0497f93960c5b280df29c91bc6e232c2b0311f6582aabb5b264c43b1dea3505b
-
SSDEEP
12288:OdQGx+KnXxFfjAQaKXGBmpO7AJ7Lgm9j7:OdvPjfav0pNJLgm9j7
Malware Config
Extracted
redline
Ninja0812
185.92.73.140:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral13/memory/1588-4-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral13/memory/1588-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral13/memory/1588-6-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 3 IoCs
Processes:
resource yara_rule behavioral13/memory/1588-4-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral13/memory/1588-9-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral13/memory/1588-6-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Installer2.exedescription pid process target process PID 2496 set thread context of 1588 2496 Installer2.exe Installer2.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Installer2.exeInstaller2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Installer2.exeInstaller2.exedescription pid process Token: SeDebugPrivilege 2496 Installer2.exe Token: SeDebugPrivilege 1588 Installer2.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Installer2.exedescription pid process target process PID 2496 wrote to memory of 1076 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1076 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1076 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1076 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1076 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1076 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1076 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe PID 2496 wrote to memory of 1588 2496 Installer2.exe Installer2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Installer2.exe"C:\Users\Admin\AppData\Local\Temp\Installer2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Installer2.exeC:\Users\Admin\AppData\Local\Temp\Installer2.exe2⤵PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\Installer2.exeC:\Users\Admin\AppData\Local\Temp\Installer2.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1588
-