Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02-12-2024 04:17
Static task
static1
General
-
Target
Run.exe
-
Size
637KB
-
MD5
d8c536f293b7c74cf5b1926a5c3a4024
-
SHA1
0e874dce8bbc4b0cbfcc7983b32a5b1e9dbdf672
-
SHA256
ae9842ba11bea23853f8f74c09ad3ae2ac713b33c40283831ff0b6e9771b47c7
-
SHA512
3dc4eccfa22e7457c3c087b94aa230d58ecf258856b32de6834b0e07f534019262cc2245774d0ddf439e3a3b939e70b79dd6bc9be577786fd97bd0c8f19ba21d
-
SSDEEP
12288:Mkg47SNyV5X708sLlvGpswba3+5yebjH8dBb48aiUzPxiDOZ5i5UGmZ3z:o54ujlvGbHz
Malware Config
Extracted
redline
rich
95.217.248.44:1052
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/3188-6-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/3188-6-0x0000000000400000-0x0000000000420000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3068 set thread context of 3188 3068 Run.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Run.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Run.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3188 3068 Run.exe 81 PID 3068 wrote to memory of 3188 3068 Run.exe 81 PID 3068 wrote to memory of 3188 3068 Run.exe 81 PID 3068 wrote to memory of 3188 3068 Run.exe 81 PID 3068 wrote to memory of 3188 3068 Run.exe 81 PID 3068 wrote to memory of 3188 3068 Run.exe 81 PID 3068 wrote to memory of 3188 3068 Run.exe 81 PID 3068 wrote to memory of 3188 3068 Run.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Run.exe"C:\Users\Admin\AppData\Local\Temp\Run.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\Run.exeC:\Users\Admin\AppData\Local\Temp\Run.exe2⤵
- System Location Discovery: System Language Discovery
PID:3188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
700B
MD56c73acc93de14f5ec2f4ace1815669fc
SHA1c7b507af5bc23cf42b1e8695a7952181b5d26276
SHA2562c8c2b0e4d080458c9ed1e7888638fd679f803af6dc209f5369dcf0f1f2ef402
SHA512b43128abf691951c5894040ba75c2e7731661d9a05f6d604291a4a60598e975b84a27c4ab7b944d106e5d17712492c079e3bf313236daca2c238fb610b6e9576