Analysis
-
max time kernel
134s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe
Resource
win10v2004-20241007-en
General
-
Target
bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe
-
Size
1.9MB
-
MD5
1f7b8dacff75b5c50f1be198b5c43b37
-
SHA1
bd2daf539af2321ea2900b5ad89bd124eaf4d47a
-
SHA256
63b2d24bd6f7657d45984c584430d9572d4ca3986359073c616c3f2787e65d8d
-
SHA512
3bb63d9bc4899ef56e1ab42520530444d81d7197f926cee0c66e9539f0885b1c09ca72b3d0e7737c06df7bcd66d887228c4f9829c94f1e58bba3a36bbf205674
-
SSDEEP
49152:e06m7NpA0GNJ/lU+zJwZjvjcpT+gDEvTqb8Td/pP6F:eA7UJ/5zGZjvjcQgGqYJ
Malware Config
Extracted
redline
@merlinholy
185.189.167.123:37360
-
auth_value
9c36b63cccb3eade62bdc17519c7bd37
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1996-6-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4264 set thread context of 1996 4264 bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4264 wrote to memory of 1996 4264 bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe 85 PID 4264 wrote to memory of 1996 4264 bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe 85 PID 4264 wrote to memory of 1996 4264 bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe 85 PID 4264 wrote to memory of 1996 4264 bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe 85 PID 4264 wrote to memory of 1996 4264 bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe"C:\Users\Admin\AppData\Local\Temp\bd2daf539af2321ea2900b5ad89bd124eaf4d47a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1996
-