Overview
overview
10Static
static
3Setup/DirectX2D.dll
windows7-x64
3Setup/DirectX2D.dll
windows10-2004-x64
3Setup/Serilog.dll
windows7-x64
1Setup/Serilog.dll
windows10-2004-x64
1Setup/Setup.exe
windows7-x64
1Setup/Setup.exe
windows10-2004-x64
10Setup/SevenZip.dll
windows7-x64
1Setup/SevenZip.dll
windows10-2004-x64
1Setup/d2game.dll
windows7-x64
3Setup/d2game.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
Setup/DirectX2D.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Setup/DirectX2D.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Setup/Serilog.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Setup/Serilog.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Setup/Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Setup/Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Setup/SevenZip.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Setup/SevenZip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Setup/d2game.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Setup/d2game.dll
Resource
win10v2004-20241007-en
General
-
Target
Setup/Setup.exe
-
Size
715.6MB
-
MD5
51a73f99875a45e7f917a9767504e10a
-
SHA1
67092a465898e364823eceb58b78d42aa732896c
-
SHA256
acf9d298548298c750994ff5c6799fc3c6650dd1826c426bba6dcb8d71bfc4fe
-
SHA512
5bd29fb25e9844888cfa2d22b08fd47e77a2e71302affc045e0b13f46dc43be0b8b776bb6a855ea6d92394738edd897886ea9c803e1358425561679eef9d8bd5
-
SSDEEP
6144:eOa7aZIBhvK5VpCNjXXnKwrKEAO8WD0IKhYh3wXs+Jd8GD6t:eONZIBhU+frXmhUXGDa
Malware Config
Extracted
redline
45.155.204.124:23180
-
auth_value
cd29bcf359b92be30552286f1ae0cfa3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral6/memory/1320-2-0x0000000000780000-0x00000000007A0000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 1320 2008 Setup.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1320 2008 Setup.exe 89 PID 2008 wrote to memory of 1320 2008 Setup.exe 89 PID 2008 wrote to memory of 1320 2008 Setup.exe 89 PID 2008 wrote to memory of 1320 2008 Setup.exe 89 PID 2008 wrote to memory of 1320 2008 Setup.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1320
-