Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
14c0a6c07b5cfce1a669a3771320bad1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
14c0a6c07b5cfce1a669a3771320bad1.exe
Resource
win10v2004-20241007-en
General
-
Target
14c0a6c07b5cfce1a669a3771320bad1.exe
-
Size
1.4MB
-
MD5
14c0a6c07b5cfce1a669a3771320bad1
-
SHA1
40c4ff3e96551b6283afd04a2d2b96985d111c11
-
SHA256
e713b0a5748a7b8332121f638462b2f5cef38a61f2b5ce0a7cd2c90922265397
-
SHA512
cae7e53b1f4093b1204313f2159f0b76dc1d0a3f4e1d8191489d8b60d36d3cdf847be1bfa18033f0faaaef85164e2b258752b75efd0328d5b7abdd7b3af5193c
-
SSDEEP
24576:pM5q1YQYFXAxclMpJeh9dMRqp/urZj8jNIYQLtuqQLL/ygh:y574yN7QLtuqQLN
Malware Config
Extracted
redline
3
45.15.156.86:37262
-
auth_value
d85366020a96552bd07acdfc49dc187c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3092-1-0x0000000000A10000-0x0000000000A38000-memory.dmp family_redline -
Redline family
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 3092 1492 14c0a6c07b5cfce1a669a3771320bad1.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14c0a6c07b5cfce1a669a3771320bad1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3092 1492 14c0a6c07b5cfce1a669a3771320bad1.exe 84 PID 1492 wrote to memory of 3092 1492 14c0a6c07b5cfce1a669a3771320bad1.exe 84 PID 1492 wrote to memory of 3092 1492 14c0a6c07b5cfce1a669a3771320bad1.exe 84 PID 1492 wrote to memory of 3092 1492 14c0a6c07b5cfce1a669a3771320bad1.exe 84 PID 1492 wrote to memory of 3092 1492 14c0a6c07b5cfce1a669a3771320bad1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\14c0a6c07b5cfce1a669a3771320bad1.exe"C:\Users\Admin\AppData\Local\Temp\14c0a6c07b5cfce1a669a3771320bad1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3092
-