Analysis
-
max time kernel
133s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 14:01
Behavioral task
behavioral1
Sample
2b5ceb18f10606859253493d936ae2815b3fed26.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2b5ceb18f10606859253493d936ae2815b3fed26.exe
Resource
win10v2004-20241007-en
General
-
Target
2b5ceb18f10606859253493d936ae2815b3fed26.exe
-
Size
647KB
-
MD5
ac39e7b10284fe04e5bdb8b588681cb4
-
SHA1
2b5ceb18f10606859253493d936ae2815b3fed26
-
SHA256
fc7da967f86d24024700aa2a488ae2ce18c038260d9e2d5067261c9bedbcfaf0
-
SHA512
0fbff528fe6962f4695be585e8a666af8d4576d75cf37d20e95658e7b1d81bebc0e308b7c4032be139768b077b08e19ed9d474d04a87c0609bac04258ccde809
-
SSDEEP
12288:tHQNnEONUb9/6VQBDthHcUzsMyl2zkoF:tqnEldUUfyl2z
Malware Config
Extracted
redline
185.38.142.167:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/5056-1-0x0000000000640000-0x00000000006E8000-memory.dmp family_redline behavioral2/memory/1156-8-0x0000000000C20000-0x0000000000C72000-memory.dmp family_redline -
Redline family
-
Loads dropped DLL 1 IoCs
pid Process 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5056 set thread context of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b5ceb18f10606859253493d936ae2815b3fed26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83 PID 5056 wrote to memory of 1156 5056 2b5ceb18f10606859253493d936ae2815b3fed26.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b5ceb18f10606859253493d936ae2815b3fed26.exe"C:\Users\Admin\AppData\Local\Temp\2b5ceb18f10606859253493d936ae2815b3fed26.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
635KB
MD507ce16eb6b4643175ac5acc3a15cc02a
SHA151834d46a39105f65d3972e0b79c75a5b1a1cbd2
SHA256174aa2135cbb50558ff4e54a4ba11a4b828559dfd0c31fb0463a364fc532bb9d
SHA512e117fce03f171efa94128ca821a2de0504f72b565e7f15de8fcd54fbc2477b1ac817c966fef4edf39ea02a9ca30e3bff8fd51ef96a326729662cf96c7ef38bed