Analysis
-
max time kernel
132s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe
Resource
win10v2004-20241007-en
General
-
Target
1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe
-
Size
300KB
-
MD5
055f1c280899149b74b2c8d619b3c161
-
SHA1
539dd992a3dfbd2abf32e37a34600be43cb9e25b
-
SHA256
1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a
-
SHA512
4d09c977487dc4f751f2bed4a3088e1a52900a925761a1e6ce19e3a30483111ea5121340c2da5840cc830223c4650e34eb7406cef492029073ae8e50735096f6
-
SSDEEP
6144:30vyHvIulvDFsNGIJgrW07AO6OnhxuLehS/kLIzy3tJ1t:306HvIulv5b77nhxS/kLH9J7
Malware Config
Extracted
redline
nam5
103.89.90.61:34589
-
auth_value
543e073674533e6c674abb1adba6e5c7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2316-1-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 2316 1940 1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2316 1940 1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe 85 PID 1940 wrote to memory of 2316 1940 1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe 85 PID 1940 wrote to memory of 2316 1940 1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe 85 PID 1940 wrote to memory of 2316 1940 1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe 85 PID 1940 wrote to memory of 2316 1940 1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe"C:\Users\Admin\AppData\Local\Temp\1d1ba6176bd62061b0b996fabe5908a24fb8c9b47423554b1ce0ef011f715b6a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2316
-