Overview
overview
10Static
static
3Warzone ha...al.dll
windows7-x64
1Warzone ha...al.dll
windows10-2004-x64
1Warzone ha...al.dll
windows10-ltsc 2021-x64
1Warzone ha...al.dll
windows11-21h2-x64
1Warzone ha...ck.exe
windows7-x64
10Warzone ha...ck.exe
windows10-2004-x64
10Warzone ha...ck.exe
windows10-ltsc 2021-x64
10Warzone ha...ck.exe
windows11-21h2-x64
10Warzone ha...v2.dll
windows7-x64
1Warzone ha...v2.dll
windows10-2004-x64
1Warzone ha...v2.dll
windows10-ltsc 2021-x64
1Warzone ha...v2.dll
windows11-21h2-x64
1Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11/11/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
Warzone hack space cheats/IA2Marshal.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Warzone hack space cheats/IA2Marshal.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Warzone hack space cheats/IA2Marshal.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Warzone hack space cheats/IA2Marshal.dll
Resource
win11-20241023-en
Behavioral task
behavioral5
Sample
Warzone hack space cheats/Warzone hack.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Warzone hack space cheats/Warzone hack.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Warzone hack space cheats/Warzone hack.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
Warzone hack space cheats/Warzone hack.exe
Resource
win11-20241023-en
Behavioral task
behavioral9
Sample
Warzone hack space cheats/libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Warzone hack space cheats/libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Warzone hack space cheats/libGLESv2.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
Warzone hack space cheats/libGLESv2.dll
Resource
win11-20241007-en
General
-
Target
Warzone hack space cheats/Warzone hack.exe
-
Size
2.5MB
-
MD5
3f4540b7b375b6f612c2256998af7c3c
-
SHA1
59d101e0020dcd567c2d0ecc271a0067122caff4
-
SHA256
e6cdd59f34d4bf7707237f377a4b58e1c4060f190068241c406b4c36719d8926
-
SHA512
ef06c781c8fe20b64b3ab7048dee8f84f7bbbfefcf2d91be1eb0206969c01962633c439d4c3929052c6a9c53b834997189f3017c4affc0079f44b29130f0c2d7
-
SSDEEP
24576:F1J/o3viYPYCQllGmmMbOdLDnay9ObwmePSGcWmLhgOL3xGhl3RuQ55313/:F1y3fv+McWmLhgOMl3h
Malware Config
Extracted
redline
193.106.191.160:8673
-
auth_value
4334b1b6304e7a30dd9472e85aa443c9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral7/memory/197048-1-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 197048 2620 Warzone hack.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Warzone hack.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2620 wrote to memory of 197048 2620 Warzone hack.exe 83 PID 2620 wrote to memory of 197048 2620 Warzone hack.exe 83 PID 2620 wrote to memory of 197048 2620 Warzone hack.exe 83 PID 2620 wrote to memory of 197048 2620 Warzone hack.exe 83 PID 2620 wrote to memory of 197048 2620 Warzone hack.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Warzone hack space cheats\Warzone hack.exe"C:\Users\Admin\AppData\Local\Temp\Warzone hack space cheats\Warzone hack.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:197048
-