Resubmissions

07-01-2025 01:39

250107-b213raxqbx 10

06-01-2025 23:51

250106-3wa3xstmfx 10

06-01-2025 23:43

250106-3qm6asvrbr 10

Analysis

  • max time kernel
    97s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-01-2025 23:43

General

  • Target

    skibidibi.zip

  • Size

    15.0MB

  • MD5

    e3c095bad1b222b74dfab35fce9b58fc

  • SHA1

    dafa30f20bfabe025c446186c3051e713559b635

  • SHA256

    ddc4ee5b164774a9bcbc42636ae1b555c0e652943f89809adfe17643739c09d9

  • SHA512

    509ef669bacb93d494e0df57ca3e5ec3d371815a58ed5c68d445bc2feba57588f6ad0a30efd4cc0894c1c63f4761a422897825021280d2ddbcd40428f5cecfbb

  • SSDEEP

    393216:oWXzo7MYwJONnGHVWx55TbJDnJ6YrNDseN3zGASyC3FzeV8Qic1k:nDokMqWD5TdbJ6YrNrzd1ABeVqc1k

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\skibidibi.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4988
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:928
    • C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Host\Kurome.Host.exe
      "C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Host\Kurome.Host.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4480
    • C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Loader\Kurome.Loader.exe
      "C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Loader\Kurome.Loader.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4540
    • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe
      "C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe
        "C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe" "--monitor"
        2⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:9468
        • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe
          "C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAcfc+zqxGdUek2aJ8Sh1JLAAAAAACAAAAAAAQZgAAAAEAACAAAAC/cJFkiuwixZ0nSGn4LJfXjrhIg3ORznux/tXnR7DUGgAAAAAOgAAAAAIAACAAAABv/njLaU+of3IuYJSxj6tYQwfqbY9Sp0GDUzKmXSMFAhAAAAAQZKatboskCzGLIFJL+sm4QAAAAJl1nlFeh+ZWejyniyrxzC4zYHYCpLDbHVL30d2XlcDagiarYwO8km++1FDUizZ3mmMaBXNOIiYzBrDyOgrm7Ps=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAcfc+zqxGdUek2aJ8Sh1JLAAAAAACAAAAAAAQZgAAAAEAACAAAACGJIL0ZtlGaWI1m+/aiFjynaFTdoWWBQi1rUfsa5jXVwAAAAAOgAAAAAIAACAAAADSptPBjtzzN9Vv7Qdvsu8wT/TZCXnBRmLuyOo+bqisaBAAAAD6GQ+CXcSM/2FGsm7/KjwNQAAAAHEZuCtHCHnSK3AvpKgXaGqWpMzSZBKMjo5uMZNwETWvFp874eBqXk72GyBBfWIwmJ3WgbJ1LoP1XhVOpG6RYcM="
          3⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:6976
          • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe
            "C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe" "auth" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAcfc+zqxGdUek2aJ8Sh1JLAAAAAACAAAAAAAQZgAAAAEAACAAAAC/cJFkiuwixZ0nSGn4LJfXjrhIg3ORznux/tXnR7DUGgAAAAAOgAAAAAIAACAAAABv/njLaU+of3IuYJSxj6tYQwfqbY9Sp0GDUzKmXSMFAhAAAAAQZKatboskCzGLIFJL+sm4QAAAAJl1nlFeh+ZWejyniyrxzC4zYHYCpLDbHVL30d2XlcDagiarYwO8km++1FDUizZ3mmMaBXNOIiYzBrDyOgrm7Ps=" "AQAAANCMnd8BFdERjHoAwE/Cl+sBAAAAcfc+zqxGdUek2aJ8Sh1JLAAAAAACAAAAAAAQZgAAAAEAACAAAACGJIL0ZtlGaWI1m+/aiFjynaFTdoWWBQi1rUfsa5jXVwAAAAAOgAAAAAIAACAAAADSptPBjtzzN9Vv7Qdvsu8wT/TZCXnBRmLuyOo+bqisaBAAAAD6GQ+CXcSM/2FGsm7/KjwNQAAAAHEZuCtHCHnSK3AvpKgXaGqWpMzSZBKMjo5uMZNwETWvFp874eBqXk72GyBBfWIwmJ3WgbJ1LoP1XhVOpG6RYcM=" "--monitor"
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:8936
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\FAQ.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:436
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Redline_20_2_crack\ReadMe.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:1732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Panel.exe.log

      Filesize

      1KB

      MD5

      fa2242a848c015e90751992478acf1b0

      SHA1

      9b54d26e4c0630490ab230b9d15119d036c3398f

      SHA256

      0b71c524f4b9a3964104689ba24c413a0811e83d1071a2bb066b66c91053f147

      SHA512

      69d1962db48657f3c8b24e79a7846aa0e4fcfc2b27c3675915a7906913c897dff0e91bd06634615d6c5b62c4afae41827d7fa1944f84d11f8a731bab1cf7629b

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Host\Kurome.Host.exe

      Filesize

      119KB

      MD5

      4fde0f80c408af27a8d3ddeffea12251

      SHA1

      e834291127af150ce287443c5ea607a7ae337484

      SHA256

      1b644cdb1c7247c07d810c0ea10bec34dc5600f3645589690a219de08cf2dedb

      SHA512

      3693aeaa2cc276060b899f21f6f57f435b75fec5bcd7725b2dd79043b341c12ebc29bd43b287eb22a3e31fd2b50c4fa36bf020f9f3db5e2f75fe8cc747eca5f5

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Host\Kurome.Host.exe.config

      Filesize

      189B

      MD5

      5a7f52d69e6fca128023469ae760c6d5

      SHA1

      9d7f75734a533615042f510934402c035ac492f7

      SHA256

      498c7f8e872f9cef0cf04f7d290cf3804c82a007202c9b484128c94d03040fd0

      SHA512

      4dc8ae80ae9e61d2801441b6928a85dcf9d6d73656d064ffbc0ce9ee3ad531bfb140e9f802e39da2a83af6de606b115e5ccd3da35d9078b413b1d1846cbd1b4f

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Host\Kurome.WCF.dll

      Filesize

      123KB

      MD5

      e3d39e30e0cdb76a939905da91fe72c8

      SHA1

      433fc7dc929380625c8a6077d3a697e22db8ed14

      SHA256

      4bfa493b75361920e6403c3d85d91a454c16ddda89a97c425257e92b352edd74

      SHA512

      9bb3477023193496ad20b7d11357e510ba3d02b036d6f35f57d061b1fc4d0f6cb3055ae040d78232c8a732d9241699ddcfac83cc377230109bf193736d9f92b8

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Loader\Kurome.Loader.exe

      Filesize

      2.2MB

      MD5

      a3ec05d5872f45528bbd05aeecf0a4ba

      SHA1

      68486279c63457b0579d86cd44dd65279f22d36f

      SHA256

      d4797b2e4957c9041ba32454657f5d9a457851c6b5845a57e0e5397707e7773e

      SHA512

      b96b582bb26cb40dbb2a0709a6c88acd87242d0607d548473e3023ffa0a6c9348922a98a4948f105ea0b8224a3930af1e698c6cee3c36ca6a83df6d20c868e8e

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Kurome.Loader\Kurome.Loader.exe.config

      Filesize

      186B

      MD5

      9070d769fd43fb9def7e9954fba4c033

      SHA1

      de4699cdf9ad03aef060470c856f44d3faa7ea7f

      SHA256

      cbaf2ae95b1133026c58ab6362af2f7fb2a1871d7ad58b87bd73137598228d9b

      SHA512

      170028b66c5d2db2b8c90105b77b0b691bf9528dc9f07d4b3983d93e9e37ea1154095aaf264fb8b5e67c167239697337cc9e585e87ef35faa65a969cac1aa518

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\FAQ.txt

      Filesize

      19KB

      MD5

      53fc20e1e68a5619f7ff2df8e99d42c4

      SHA1

      7a8ddc81d16aaab533411810acfad1546c30dc2f

      SHA256

      fc7ceb47aa8796614f098406452ea67cb58929ded1d4c6bd944d4d34921bba0b

      SHA512

      c1ad4f2dfd50528d613e9fe3f55da0bbb5c8442b459d9c3c989b75014c827306f72f2eb6ecbcd92ff11546e12087c09685b12a7dc258c5ea85c15ba5cc002d8c

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe

      Filesize

      9.3MB

      MD5

      f4e19b67ef27af1434151a512860574e

      SHA1

      56304fc2729974124341e697f3b21c84a8dd242a

      SHA256

      c7a8709013ada38fc2e1ceb3b15631f2aea8e156eb3f0aa197e02df1259a493a

      SHA512

      a92e73d58c51bb74618987f06166f52a65ed1525410aec1b8e377ea8547c1123e313e13e305310f7a750c4561756d87ff558670bf4df8b62ea874d6f7c14ca77

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\Panel.exe.config

      Filesize

      26KB

      MD5

      494890d393a5a8c54771186a87b0265e

      SHA1

      162fa5909c1c3f84d34bda5d3370a957fe58c9c8

      SHA256

      f2a5a06359713226aeacfe239eeb8ae8606f4588d8e58a19947c3a190efbdfc7

      SHA512

      40fbd033f288fee074fc36e899796efb30d3c582784b834fc583706f19a0b8d5a134c6d1405afe563d2676072e4eefc4e169b2087867cab77a3fa1aa1a7c9395

    • C:\Users\Admin\Desktop\Redline_20_2_crack\Panel\RedLine_20_2\Panel\serviceSettings.json

      Filesize

      74B

      MD5

      0ff78cb381410bd5fbb47343ead61916

      SHA1

      84c7bebff975ce1710f762787eaa5cb7059edbba

      SHA256

      bece84f0e07927c39bd0ba14328066988142d7d5e8b2e7ca2226261576988427

      SHA512

      81ca9be129f22b1f1da037f7ee08b7d3b62cf8e56c6bb26c4ed1970feebd9f7a4b628216786957c3a7da095e5a54a226346442830d28fcfd618ea32bf7c82389

    • C:\Users\Admin\Desktop\Redline_20_2_crack\ReadMe.txt

      Filesize

      401B

      MD5

      0e9ea2262b11db9e8c1656c949da4495

      SHA1

      f332749e10817048cea5e1584edf5e88f47024eb

      SHA256

      ad8361226621c8261d69e1202e7f9831a00f3bb6549d77219d5deb0e8a6cbde6

      SHA512

      00aae0c559823ff27ca8af431d24d4fe8a3f4683b0d776a80fb14a96d82030cedf6ec1ddf2efd7fc229e2c2b3ab3ac0b15326dc1912cdd07932ec7ff8f80975c

    • C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.dll

      Filesize

      3.4MB

      MD5

      059d51f43f1a774bc5aa76d19c614670

      SHA1

      171329bf0f48190cf4d59ce106b139e63507457d

      SHA256

      2eaf3d548927ebd243362f7bcb906bb1bbff3961223fb9521cb2846b6b8d523d

      SHA512

      a299cb18c8a47fc27c46db0011266b7fa273852b302374eb98a54034e1281150af8e54e58f76a384d3b92fbcb1a67fc0452cabe592a379e15cce2c5f9a4b6cb7

    • memory/4480-63-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/4480-71-0x0000000004C90000-0x0000000004CCC000-memory.dmp

      Filesize

      240KB

    • memory/4480-74-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/4480-73-0x0000000004EA0000-0x0000000004F6E000-memory.dmp

      Filesize

      824KB

    • memory/4480-75-0x0000000005080000-0x000000000518A000-memory.dmp

      Filesize

      1.0MB

    • memory/4480-76-0x0000000004E00000-0x0000000004E28000-memory.dmp

      Filesize

      160KB

    • memory/4480-77-0x0000000004F70000-0x0000000004FC0000-memory.dmp

      Filesize

      320KB

    • memory/4480-84-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

      Filesize

      4KB

    • memory/4480-85-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/4480-72-0x0000000004D50000-0x0000000004D9C000-memory.dmp

      Filesize

      304KB

    • memory/4480-70-0x0000000004C70000-0x0000000004C82000-memory.dmp

      Filesize

      72KB

    • memory/4480-61-0x0000000074E2E000-0x0000000074E2F000-memory.dmp

      Filesize

      4KB

    • memory/4480-62-0x0000000000130000-0x0000000000154000-memory.dmp

      Filesize

      144KB

    • memory/4480-69-0x00000000053F0000-0x0000000005A08000-memory.dmp

      Filesize

      6.1MB

    • memory/4480-68-0x0000000074E20000-0x00000000755D1000-memory.dmp

      Filesize

      7.7MB

    • memory/4480-67-0x0000000004B70000-0x0000000004B96000-memory.dmp

      Filesize

      152KB

    • memory/4540-82-0x0000000007A30000-0x0000000008040000-memory.dmp

      Filesize

      6.1MB

    • memory/4540-81-0x00000000008C0000-0x0000000000AF6000-memory.dmp

      Filesize

      2.2MB

    • memory/4584-118-0x000000001DAC0000-0x000000001DC02000-memory.dmp

      Filesize

      1.3MB

    • memory/4584-140-0x000000001DBD0000-0x000000001DBDA000-memory.dmp

      Filesize

      40KB

    • memory/4584-93-0x000000001AC20000-0x000000001ADC0000-memory.dmp

      Filesize

      1.6MB

    • memory/4584-92-0x000000001AC20000-0x000000001ADC0000-memory.dmp

      Filesize

      1.6MB

    • memory/4584-114-0x000000001DAC0000-0x000000001DC02000-memory.dmp

      Filesize

      1.3MB

    • memory/4584-126-0x000000001DE90000-0x000000001DFD2000-memory.dmp

      Filesize

      1.3MB

    • memory/4584-102-0x0000000180000000-0x0000000180005000-memory.dmp

      Filesize

      20KB

    • memory/4584-113-0x000000001DAC0000-0x000000001DC02000-memory.dmp

      Filesize

      1.3MB

    • memory/4584-145-0x000000001DBD0000-0x000000001DBDA000-memory.dmp

      Filesize

      40KB

    • memory/4584-153-0x000000001DBE0000-0x000000001DBEA000-memory.dmp

      Filesize

      40KB

    • memory/4584-143-0x000000001DBD0000-0x000000001DBDA000-memory.dmp

      Filesize

      40KB

    • memory/4584-105-0x0000000180000000-0x0000000180005000-memory.dmp

      Filesize

      20KB

    • memory/4584-142-0x000000001DBD0000-0x000000001DBDA000-memory.dmp

      Filesize

      40KB

    • memory/4584-154-0x00007FFF21F00000-0x00007FFF2204F000-memory.dmp

      Filesize

      1.3MB

    • memory/4584-103-0x0000000180000000-0x0000000180005000-memory.dmp

      Filesize

      20KB

    • memory/4584-160-0x000000001E640000-0x000000001E9A2000-memory.dmp

      Filesize

      3.4MB

    • memory/4584-161-0x000000001E9B0000-0x000000001EF56000-memory.dmp

      Filesize

      5.6MB

    • memory/4584-162-0x000000001F160000-0x000000001F1F2000-memory.dmp

      Filesize

      584KB

    • memory/4584-183-0x000000001F400000-0x000000001F41C000-memory.dmp

      Filesize

      112KB

    • memory/4584-194-0x000000001F420000-0x000000001F59C000-memory.dmp

      Filesize

      1.5MB

    • memory/4584-89-0x00007FFF17350000-0x00007FFF17E12000-memory.dmp

      Filesize

      10.8MB

    • memory/4584-91-0x000000001AC20000-0x000000001ADC0000-memory.dmp

      Filesize

      1.6MB

    • memory/4584-109-0x0000000180000000-0x0000000180005000-memory.dmp

      Filesize

      20KB

    • memory/4584-107-0x0000000180000000-0x0000000180005000-memory.dmp

      Filesize

      20KB

    • memory/9468-3950-0x000000001FD20000-0x000000001FFA6000-memory.dmp

      Filesize

      2.5MB

    • memory/9468-3967-0x00000000206D0000-0x000000002070C000-memory.dmp

      Filesize

      240KB

    • memory/9468-3966-0x00000000205D0000-0x00000000206D0000-memory.dmp

      Filesize

      1024KB

    • memory/9468-4011-0x0000000020AA0000-0x0000000020B50000-memory.dmp

      Filesize

      704KB

    • memory/9468-3996-0x00000000209B0000-0x00000000209EA000-memory.dmp

      Filesize

      232KB

    • memory/9468-3982-0x0000000020750000-0x0000000020762000-memory.dmp

      Filesize

      72KB

    • memory/9468-4045-0x00000000210B0000-0x0000000021124000-memory.dmp

      Filesize

      464KB

    • memory/9468-4059-0x0000000024940000-0x000000002498A000-memory.dmp

      Filesize

      296KB

    • memory/9468-4060-0x0000000020C40000-0x0000000020C90000-memory.dmp

      Filesize

      320KB

    • memory/9468-3968-0x0000000020710000-0x0000000020722000-memory.dmp

      Filesize

      72KB

    • memory/9468-3965-0x000000001FFB0000-0x00000000205C8000-memory.dmp

      Filesize

      6.1MB

    • memory/9468-4073-0x0000000021E80000-0x0000000021F1C000-memory.dmp

      Filesize

      624KB

    • memory/9468-4077-0x0000000021F20000-0x0000000021F6F000-memory.dmp

      Filesize

      316KB

    • memory/9468-4078-0x0000000021F70000-0x000000002207A000-memory.dmp

      Filesize

      1.0MB

    • memory/9468-4079-0x00000000220B0000-0x00000000220E0000-memory.dmp

      Filesize

      192KB

    • memory/9468-4080-0x0000000021E20000-0x0000000021E42000-memory.dmp

      Filesize

      136KB

    • memory/9468-4081-0x0000000025A70000-0x0000000025DDC000-memory.dmp

      Filesize

      3.4MB

    • memory/9468-4096-0x0000000021E50000-0x0000000021E68000-memory.dmp

      Filesize

      96KB

    • memory/9468-3964-0x000000001F970000-0x000000001F98A000-memory.dmp

      Filesize

      104KB

    • memory/9468-3947-0x000000001FCB0000-0x000000001FD16000-memory.dmp

      Filesize

      408KB