Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11/03/2025, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20250217-en
General
-
Target
Setup.exe
-
Size
7.2MB
-
MD5
691de5f672de4897dfbd2e54418dc587
-
SHA1
a63cb199ef02798caa326ed80412dc2ec0bed5ad
-
SHA256
ed1784d50e3da5daa8178094fcee1fa9c0e5509bf1e77d0acf6f1cf11dd44fff
-
SHA512
15d830e16e8a7bfedc1f94934bbeb44a21e8ae7a0e62daf7fbf6a5385aa69d9dba62113fa7ccfac916832fe1bdfda55a84358c1a01e3db03dc86175ed2be1a76
-
SSDEEP
98304:i8ZwIQDCfn6ujDo5XrTuE3/P23ULzv5ZaG4nQm+:i8ZwXDCftoBrTu++gzho4
Malware Config
Extracted
redline
1
193.233.132.32:38976
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2316-20-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Redline family
-
Loads dropped DLL 1 IoCs
pid Process 3388 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3388 set thread context of 2316 3388 Setup.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3388 wrote to memory of 2316 3388 Setup.exe 88 PID 3388 wrote to memory of 2316 3388 Setup.exe 88 PID 3388 wrote to memory of 2316 3388 Setup.exe 88 PID 3388 wrote to memory of 2316 3388 Setup.exe 88 PID 3388 wrote to memory of 2316 3388 Setup.exe 88 PID 3388 wrote to memory of 2316 3388 Setup.exe 88 PID 3388 wrote to memory of 2316 3388 Setup.exe 88 PID 3388 wrote to memory of 2316 3388 Setup.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719