Analysis
-
max time kernel
132s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
71d9e1a060b59e293a2e098444b63221.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
71d9e1a060b59e293a2e098444b63221.exe
Resource
win10v2004-20241007-en
General
-
Target
71d9e1a060b59e293a2e098444b63221.exe
-
Size
294KB
-
MD5
71d9e1a060b59e293a2e098444b63221
-
SHA1
5fde17a9e0b83c7e994bfa433eabd821f7589528
-
SHA256
989079c4efa222424d97d1e0e763defcdba4c0e83aaf06cbe31b71f7e38afb71
-
SHA512
11fa8b09b2cb68d48d9d54d592a4a60d86801df173ab5eafc0b1f28c26efb6c3b4b5257188d98ce1a758d25bb8645a0909ffe13fc86c2cd529d2710cd32200a6
-
SSDEEP
6144:iWgfoGFED9pK4gzrAOcWKEXdklSzMkfn5:iZfoGFEmqWKEXSDQn
Malware Config
Extracted
redline
9-5
139.99.32.83:43199
-
auth_value
637de2b47f42d9cc7912f71cb6b57b5b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4636-2-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4056 set thread context of 4636 4056 71d9e1a060b59e293a2e098444b63221.exe 86 -
Program crash 1 IoCs
pid pid_target Process procid_target 1128 4056 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71d9e1a060b59e293a2e098444b63221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4056 wrote to memory of 4636 4056 71d9e1a060b59e293a2e098444b63221.exe 86 PID 4056 wrote to memory of 4636 4056 71d9e1a060b59e293a2e098444b63221.exe 86 PID 4056 wrote to memory of 4636 4056 71d9e1a060b59e293a2e098444b63221.exe 86 PID 4056 wrote to memory of 4636 4056 71d9e1a060b59e293a2e098444b63221.exe 86 PID 4056 wrote to memory of 4636 4056 71d9e1a060b59e293a2e098444b63221.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\71d9e1a060b59e293a2e098444b63221.exe"C:\Users\Admin\AppData\Local\Temp\71d9e1a060b59e293a2e098444b63221.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 3042⤵
- Program crash
PID:1128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4056 -ip 40561⤵PID:2672