Analysis
-
max time kernel
131s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
ab3882985ecd84d6225d3cbedf7f724b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab3882985ecd84d6225d3cbedf7f724b.exe
Resource
win10v2004-20241007-en
General
-
Target
ab3882985ecd84d6225d3cbedf7f724b.exe
-
Size
581KB
-
MD5
ab3882985ecd84d6225d3cbedf7f724b
-
SHA1
fadd76ae1cc77aa997a07f0fcc55897895cb80d0
-
SHA256
cc1c9c49ccd378506232eb07dd0785c4e30aaf05939941e425b10a22dc0e1971
-
SHA512
8734a498280f39546176d774fded2ec003b8283a4065d619bf1cde05093ac26f3226bbe3d1abce3e836c7623c88570cbf0873504afa2566f921ec0ab3ea64adf
-
SSDEEP
12288:HqyQuz/GcTFDCoXBSPU2doUU0B93uIpUQ8I5G:HCuzSPpdo6PkQ8I5
Malware Config
Extracted
redline
1
107.182.129.73:21733
-
auth_value
3a5bb0917495b4312d052a0b8977d2bb
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/2468-2-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2468-9-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2468-8-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1320 set thread context of 2468 1320 ab3882985ecd84d6225d3cbedf7f724b.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab3882985ecd84d6225d3cbedf7f724b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2468 1320 ab3882985ecd84d6225d3cbedf7f724b.exe 32 PID 1320 wrote to memory of 2468 1320 ab3882985ecd84d6225d3cbedf7f724b.exe 32 PID 1320 wrote to memory of 2468 1320 ab3882985ecd84d6225d3cbedf7f724b.exe 32 PID 1320 wrote to memory of 2468 1320 ab3882985ecd84d6225d3cbedf7f724b.exe 32 PID 1320 wrote to memory of 2468 1320 ab3882985ecd84d6225d3cbedf7f724b.exe 32 PID 1320 wrote to memory of 2468 1320 ab3882985ecd84d6225d3cbedf7f724b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab3882985ecd84d6225d3cbedf7f724b.exe"C:\Users\Admin\AppData\Local\Temp\ab3882985ecd84d6225d3cbedf7f724b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2468
-