Overview
overview
10Static
static
10Bird.exe
windows7-x64
10Bird.exe
windows10-2004-x64
10CSGO FREE HACK.exe
windows7-x64
10CSGO FREE HACK.exe
windows10-2004-x64
10CSGO FREEHACK.exe
windows7-x64
3CSGO FREEHACK.exe
windows10-2004-x64
3CSGhost-v4.1.exe
windows7-x64
8CSGhost-v4.1.exe
windows10-2004-x64
10Install.exe
windows7-x64
10Install.exe
windows10-2004-x64
10Installer.exe
windows7-x64
10Installer.exe
windows10-2004-x64
10Installer2.exe
windows7-x64
10Installer2.exe
windows10-2004-x64
10Kiddions Mod MENU.exe
windows7-x64
7Kiddions Mod MENU.exe
windows10-2004-x64
7Minecraft_v4.5.exe
windows7-x64
10Minecraft_v4.5.exe
windows10-2004-x64
10Vape Crack.exe
windows7-x64
10Vape Crack.exe
windows10-2004-x64
10Vape Patch.exe
windows7-x64
10Vape Patch.exe
windows10-2004-x64
10Vape_V4.exe
windows7-x64
10Vape_V4.exe
windows10-2004-x64
10launcher.exe
windows7-x64
10launcher.exe
windows10-2004-x64
10nixware crack.exe
windows7-x64
3nixware crack.exe
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 16:28
Behavioral task
behavioral1
Sample
Bird.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Bird.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CSGO FREE HACK.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CSGO FREE HACK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
CSGO FREEHACK.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
CSGO FREEHACK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
CSGhost-v4.1.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
CSGhost-v4.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Install.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Install.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Installer.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Installer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Installer2.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Installer2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Kiddions Mod MENU.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Kiddions Mod MENU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Minecraft_v4.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Minecraft_v4.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Vape Crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Vape Crack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Vape Patch.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Vape Patch.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Vape_V4.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Vape_V4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
launcher.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
nixware crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
nixware crack.exe
Resource
win10v2004-20241007-en
General
-
Target
Vape Patch.exe
-
Size
1.3MB
-
MD5
8454f382107d764cc0ba8c1df3b7d7b5
-
SHA1
797833088a010068fdc0a9b8becdd14f3166f7b8
-
SHA256
7a5e1184dafbeff212207211036f9014ae1d16b34b8118be275144e40de13bb7
-
SHA512
b382346d2a0b9c77808d0763d0ceff2e1c94b2ea937c3025c721fe528bc64450b1f37c486ed25dd666fe98671784de16535bbeecf8418f58fcfa630c25c000f6
-
SSDEEP
12288:NhsR1GdSzE2JlHb+Z8+EPu+p+/YrQwo54:O1CZ
Malware Config
Extracted
redline
@krxstkrxst
jonaianell.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral21/memory/1796-13-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral21/memory/1796-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral21/memory/1796-6-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral21/memory/1796-5-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral21/memory/1796-11-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
Processes:
resource yara_rule behavioral21/memory/1796-13-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral21/memory/1796-9-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral21/memory/1796-6-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral21/memory/1796-5-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral21/memory/1796-11-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Vape Patch.exedescription pid process target process PID 2420 set thread context of 1796 2420 Vape Patch.exe Vape Patch.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Vape Patch.exeVape Patch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vape Patch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vape Patch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Vape Patch.exedescription pid process Token: SeDebugPrivilege 1796 Vape Patch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
Vape Patch.exedescription pid process target process PID 2420 wrote to memory of 1652 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1652 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1652 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1652 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1652 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1652 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1652 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 2252 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 2252 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 2252 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 2252 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 2252 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 2252 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 2252 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe PID 2420 wrote to memory of 1796 2420 Vape Patch.exe Vape Patch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"2⤵PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"2⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"C:\Users\Admin\AppData\Local\Temp\Vape Patch.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1796
-