Overview
overview
10Static
static
3MultiHack v1.7.zip
windows11-21h2-x64
1MultiHack ...er.exe
windows11-21h2-x64
10MultiHack ...ME.txt
windows11-21h2-x64
3MultiHack ...vm.cfg
windows11-21h2-x64
3MultiHack ...sy.txt
windows11-21h2-x64
3MultiHack ...ap.txt
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...st.txt
windows11-21h2-x64
3MultiHack ...ts.txt
windows11-21h2-x64
3MultiHack ...ds.txt
windows11-21h2-x64
3MultiHack ...nu.txt
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...ts.txt
windows11-21h2-x64
3MultiHack ...ut.txt
windows11-21h2-x64
3MultiHack ...da.txt
windows11-21h2-x64
3MultiHack ...le.txt
windows11-21h2-x64
3MultiHack ...ot.txt
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...es.txt
windows11-21h2-x64
3MultiHack ...fo.txt
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...ts.dsp
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...st.txt
windows11-21h2-x64
3MultiHack ...re.txt
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...ns.txt
windows11-21h2-x64
3MultiHack ...ta.txt
windows11-21h2-x64
3MultiHack ...es.txt
windows11-21h2-x64
3MultiHack ...er.ini
windows11-21h2-x64
3MultiHack ...al.dll
windows11-21h2-x64
1Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/01/2025, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
MultiHack v1.7.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
MultiHack v1.7/Loader.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
MultiHack v1.7/README.txt
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
MultiHack v1.7/jvm.cfg
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
MultiHack v1.7/scripts/actbusy.txt
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
MultiHack v1.7/scripts/actremap.txt
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
MultiHack v1.7/scripts/audio_options.txt
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
MultiHack v1.7/scripts/bonus_maps_manifest.txt
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
MultiHack v1.7/scripts/bugreporter_defaults.txt
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
MultiHack v1.7/scripts/chapterbackgrounds.txt
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
MultiHack v1.7/scripts/clientmenu.txt
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
MultiHack v1.7/scripts/controller_options.txt
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
MultiHack v1.7/scripts/credits.txt
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
MultiHack v1.7/scripts/damagecutout.txt
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
MultiHack v1.7/scripts/damagecutout_ceda.txt
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
MultiHack v1.7/scripts/damagecutout_female.txt
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
MultiHack v1.7/scripts/damagecutout_laughriot.txt
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
MultiHack v1.7/scripts/debugoptions.txt
Resource
win11-20241007-en
Behavioral task
behavioral19
Sample
MultiHack v1.7/scripts/game_options.consoles.txt
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
MultiHack v1.7/scripts/gameinfo.txt
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
MultiHack v1.7/scripts/gameuianimations.txt
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
MultiHack v1.7/scripts/hl2_scripts.dsp
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
MultiHack v1.7/scripts/hudanimations.txt
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
MultiHack v1.7/scripts/instructor_texturemanifest.txt
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
MultiHack v1.7/scripts/inventory_structure.txt
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
MultiHack v1.7/scripts/mod_lessons.txt
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
MultiHack v1.7/scripts/motion_controller_move_options.txt
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
MultiHack v1.7/scripts/mouse_keyboard_options.txt
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
MultiHack v1.7/scripts/propdata.txt
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
MultiHack v1.7/scripts/sentences.txt
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
MultiHack v1.7/updater.ini
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
MultiHack v1.7/val.dll
Resource
win11-20241007-en
General
-
Target
MultiHack v1.7/Loader.exe
-
Size
613KB
-
MD5
eaf135289c47813fb42ca5c8725a318c
-
SHA1
b10df8a1ed28477738aa49d13075ae379cee59e4
-
SHA256
d32338a207e0c9389388cebeb45abe709e4dc6fe02d0f8267b478fd2cfeb1760
-
SHA512
c9288aee9876d006ce998753785982c086382ecbfaecb0f6fca7e445ce0f42efe3375771e0d9211f3dadcf09476c607584c09038dd970c325cc1d314ccc0abed
-
SSDEEP
12288:k55CP3Izb3vmJxMtTCGpZo0kidUBHZ2MErqp4tv/D7YmvDeDidYA7j//GrzS3emc:kqPIHmKTCGDoT
Malware Config
Extracted
redline
@bloodyrain12
147.45.47.93:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2424-10-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Loads dropped DLL 1 IoCs
pid Process 4116 Loader.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4116 set thread context of 2424 4116 Loader.exe 78 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4116 wrote to memory of 2424 4116 Loader.exe 78 PID 4116 wrote to memory of 2424 4116 Loader.exe 78 PID 4116 wrote to memory of 2424 4116 Loader.exe 78 PID 4116 wrote to memory of 2424 4116 Loader.exe 78 PID 4116 wrote to memory of 2424 4116 Loader.exe 78 PID 4116 wrote to memory of 2424 4116 Loader.exe 78 PID 4116 wrote to memory of 2424 4116 Loader.exe 78 PID 4116 wrote to memory of 2424 4116 Loader.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\MultiHack v1.7\Loader.exe"C:\Users\Admin\AppData\Local\Temp\MultiHack v1.7\Loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
Filesize
424KB
MD5fda3a1397022e33760f8ae5897f933b2
SHA1976962a81130844f2443cf547e4f9371a2cb3582
SHA2566acaef80c9fa895febc846f53429bc104a1e31c0f6ef594cba173f43cee3691c
SHA5128766cf40885bd60a15eca9f39dc0d7c63ff096c14f9aea0b5e3dbb7507aa43a3d50cd363890ac2ec50e3f28a163f7f6efa57ea9faf2c441313e7d2b773820dba