Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/03/2025, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win11-20250217-en
General
-
Target
Setup.exe
-
Size
7.2MB
-
MD5
691de5f672de4897dfbd2e54418dc587
-
SHA1
a63cb199ef02798caa326ed80412dc2ec0bed5ad
-
SHA256
ed1784d50e3da5daa8178094fcee1fa9c0e5509bf1e77d0acf6f1cf11dd44fff
-
SHA512
15d830e16e8a7bfedc1f94934bbeb44a21e8ae7a0e62daf7fbf6a5385aa69d9dba62113fa7ccfac916832fe1bdfda55a84358c1a01e3db03dc86175ed2be1a76
-
SSDEEP
98304:i8ZwIQDCfn6ujDo5XrTuE3/P23ULzv5ZaG4nQm+:i8ZwXDCftoBrTu++gzho4
Malware Config
Extracted
redline
1
193.233.132.32:38976
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1944-16-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Redline family
-
Loads dropped DLL 1 IoCs
pid Process 3564 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3564 set thread context of 1944 3564 Setup.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1944 3564 Setup.exe 83 PID 3564 wrote to memory of 1944 3564 Setup.exe 83 PID 3564 wrote to memory of 1944 3564 Setup.exe 83 PID 3564 wrote to memory of 1944 3564 Setup.exe 83 PID 3564 wrote to memory of 1944 3564 Setup.exe 83 PID 3564 wrote to memory of 1944 3564 Setup.exe 83 PID 3564 wrote to memory of 1944 3564 Setup.exe 83 PID 3564 wrote to memory of 1944 3564 Setup.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe2⤵
- System Location Discovery: System Language Discovery
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD5544cd51a596619b78e9b54b70088307d
SHA14769ddd2dbc1dc44b758964ed0bd231b85880b65
SHA256dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd
SHA512f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719