Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 17:17
Behavioral task
behavioral1
Sample
exe/2323.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
exe/2323.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
exe/FIImora_FuII.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
exe/FIImora_FuII.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
exe/fakehack.exe
Resource
win7-20240708-en
General
-
Target
exe/FIImora_FuII.exe
-
Size
311.3MB
-
MD5
f9bdc70dc4134ac051f52d6898f74fbf
-
SHA1
d7744bccdde5bf3d5134a85c858a6b3896ea0cac
-
SHA256
fa80a704adb4dbb67d23e55b08aa428c0bebe881e478aa997ca42f817d778e89
-
SHA512
6a7e45b661394fd7abf24031670d12b1550c114de1c0eaa8679be6afc2a0139d10307e0b23426b7031032740f89875242c67cb07c4787de1d33bb2289b387fc1
-
SSDEEP
3072:gj7kvws1y+IW9xdlmg1vjsZn/nw12LGben3ZvA9Af/i+9PaUtwef2ZpA:Q7kvw5+F9Dl5vjsBvwoLGytA94UA
Malware Config
Extracted
redline
1086881322_99
doshirak.top:3306
doshirak.top:28786
-
auth_value
c7b4b3ad5c912786e8dea8b34a307b0d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral3/memory/2792-3-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral3/memory/2792-10-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral3/memory/2792-9-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 2792 2164 FIImora_FuII.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FIImora_FuII.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32 PID 2164 wrote to memory of 2792 2164 FIImora_FuII.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\exe\FIImora_FuII.exe"C:\Users\Admin\AppData\Local\Temp\exe\FIImora_FuII.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2792
-