Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe
Resource
win10v2004-20241007-en
General
-
Target
845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe
-
Size
1.9MB
-
MD5
dda1dea731f0b01a4b4994ff0b7585fb
-
SHA1
845b7fdbed0113d9a61013aa79d50d0b492b41d9
-
SHA256
efb6dcb4dcc4160d98a62a53b5a01437d02ef6893ab44375c9758a0d0f50d7cc
-
SHA512
c77affdb44d7d07528167792287515f5d6acc5ee4898d89ddb032b904ada76e57556279557fca8d7a99dc9ede7e686f2ac7e3ca85968d053c1f873a8479d7ab7
-
SSDEEP
49152:e06m7NpA0GNJ/lU+zJwZjvjcpT+gDEvTqb8Td/pP6F:eA7UJ/5zGZjvjcQgGqYJ
Malware Config
Extracted
redline
@merlinholy
185.189.167.123:37360
-
auth_value
9c36b63cccb3eade62bdc17519c7bd37
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4944-5-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1516 set thread context of 4944 1516 845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1516 wrote to memory of 4944 1516 845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe 86 PID 1516 wrote to memory of 4944 1516 845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe 86 PID 1516 wrote to memory of 4944 1516 845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe 86 PID 1516 wrote to memory of 4944 1516 845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe 86 PID 1516 wrote to memory of 4944 1516 845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe"C:\Users\Admin\AppData\Local\Temp\845b7fdbed0113d9a61013aa79d50d0b492b41d9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4944
-