Overview
overview
10Static
static
100ce8e2125c...fa.exe
windows7-x64
100ce8e2125c...fa.exe
windows10-2004-x64
100d08fd5994...a1.exe
windows7-x64
100d08fd5994...a1.exe
windows10-2004-x64
100d39a7ade0...a9.exe
windows7-x64
100d39a7ade0...a9.exe
windows10-2004-x64
100d7cbc8822...d3.exe
windows7-x64
100d7cbc8822...d3.exe
windows10-2004-x64
100da351d641...30.exe
windows7-x64
100da351d641...30.exe
windows10-2004-x64
100dcb9d68dd...81.exe
windows7-x64
100dcb9d68dd...81.exe
windows10-2004-x64
100de35a9720...08.exe
windows7-x64
30de35a9720...08.exe
windows10-2004-x64
30df2367bf9...81.exe
windows7-x64
100df2367bf9...81.exe
windows10-2004-x64
70df7144ed5...52.exe
windows7-x64
100df7144ed5...52.exe
windows10-2004-x64
100df97b99ca...e3.exe
windows7-x64
10df97b99ca...e3.exe
windows10-2004-x64
40e48a47f40...30.exe
windows7-x64
100e48a47f40...30.exe
windows10-2004-x64
100e820aad5e...54.exe
windows7-x64
100e820aad5e...54.exe
windows10-2004-x64
100ea0e36c70...d3.exe
windows7-x64
100ea0e36c70...d3.exe
windows10-2004-x64
100eb27c6385...3a.exe
windows7-x64
100eb27c6385...3a.exe
windows10-2004-x64
100ee8580c3e...ef.exe
windows7-x64
100ee8580c3e...ef.exe
windows10-2004-x64
100eed307263...f5.exe
windows7-x64
100eed307263...f5.exe
windows10-2004-x64
10Analysis
-
max time kernel
37s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:33
Behavioral task
behavioral1
Sample
0ce8e2125cf9b2549eeb18b14754aa2158878fc9eabcde0f54d75556492048fa.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0ce8e2125cf9b2549eeb18b14754aa2158878fc9eabcde0f54d75556492048fa.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
0d08fd5994f0570ef78ba20f575849b2e9c9eb01aeb29c0cd7b5c534552870a1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0d08fd5994f0570ef78ba20f575849b2e9c9eb01aeb29c0cd7b5c534552870a1.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral5
Sample
0d39a7ade0eaa19a185fc11508caeba9.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0d39a7ade0eaa19a185fc11508caeba9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
0d7cbc882298f639d31191a03ec81bd3.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
0d7cbc882298f639d31191a03ec81bd3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
0da351d641066e6d8ebb95e8bcb6e030.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
0da351d641066e6d8ebb95e8bcb6e030.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
0dcb9d68dd68eefabbec3c03cc3e8381.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0dcb9d68dd68eefabbec3c03cc3e8381.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
0de35a97204bf9ccbe98450bbae38fe0e7c92d608328b2e600bf5484b0a3b908.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
0de35a97204bf9ccbe98450bbae38fe0e7c92d608328b2e600bf5484b0a3b908.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
0df2367bf99523e1510e59310538d736cd3b125dcf0d76a09644fe7c65402f81.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
0df2367bf99523e1510e59310538d736cd3b125dcf0d76a09644fe7c65402f81.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
0df7144ed5104422c08fe0b6de1e2452.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
0df7144ed5104422c08fe0b6de1e2452.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
0df97b99ca90dd92e313196ed212ed8bb7931ed5ff381a3dbce0e0479f820ae3.exe
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
0df97b99ca90dd92e313196ed212ed8bb7931ed5ff381a3dbce0e0479f820ae3.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
0e48a47f400685a0d5ded8ad220d8f30.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
0e48a47f400685a0d5ded8ad220d8f30.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
0e820aad5e8af67e2f996c9261b1b8c500e26eab8fd99d9ec67dfecceb43aa54.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
0e820aad5e8af67e2f996c9261b1b8c500e26eab8fd99d9ec67dfecceb43aa54.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
0ea0e36c7047f7b2bf48101f2d9f62467b4bbf3749386f53ed607061ad0f0ed3.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
0ea0e36c7047f7b2bf48101f2d9f62467b4bbf3749386f53ed607061ad0f0ed3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
0eb27c638574f831cab876ce13b9043a.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
0eb27c638574f831cab876ce13b9043a.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
0ee8580c3e8ccbefcf4d8b060189dd2dadfdb559b420c4a732270d7303fae6ef.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
0ee8580c3e8ccbefcf4d8b060189dd2dadfdb559b420c4a732270d7303fae6ef.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
0eed30726330520f68b4bec97e71989bc143e8755d0b918d2add30a15ce848f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
0eed30726330520f68b4bec97e71989bc143e8755d0b918d2add30a15ce848f5.exe
Resource
win10v2004-20250314-en
General
-
Target
0df7144ed5104422c08fe0b6de1e2452.exe
-
Size
919KB
-
MD5
0df7144ed5104422c08fe0b6de1e2452
-
SHA1
665ac4c2866348f6b31482a410b1047707599409
-
SHA256
cf2142b71c02cebf4aca8910971c84f52b7692fdc6c7bdccebf8c93f6c9aca1c
-
SHA512
728e0f8c6e92c003813ac67895d05cdc944f172d444712ab101c8aa3d65e38715bf205dc6eeebedeef0b45400569f6fc41ab297c1610c9295cdfa8a48dbf7374
-
SSDEEP
12288:emxlloFX4YHwjBZXJ7HZAO/DrpDAmwySmAa5D9iX5HV/o7TcCiP0wMlP7r9r/+pj:eWlQ2HJzmO//+a5D9q/+TcLl61q
Malware Config
Extracted
redline
REALLOG
196.251.92.11:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral17/memory/2840-30-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral17/memory/2840-29-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral17/memory/2840-28-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral17/memory/2840-25-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral17/memory/2840-23-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2540 powershell.exe 2908 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2608 set thread context of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0df7144ed5104422c08fe0b6de1e2452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0df7144ed5104422c08fe0b6de1e2452.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2608 0df7144ed5104422c08fe0b6de1e2452.exe 2608 0df7144ed5104422c08fe0b6de1e2452.exe 2540 powershell.exe 2908 powershell.exe 2840 0df7144ed5104422c08fe0b6de1e2452.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2608 0df7144ed5104422c08fe0b6de1e2452.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeDebugPrivilege 2908 powershell.exe Token: SeDebugPrivilege 2840 0df7144ed5104422c08fe0b6de1e2452.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2540 2608 0df7144ed5104422c08fe0b6de1e2452.exe 29 PID 2608 wrote to memory of 2540 2608 0df7144ed5104422c08fe0b6de1e2452.exe 29 PID 2608 wrote to memory of 2540 2608 0df7144ed5104422c08fe0b6de1e2452.exe 29 PID 2608 wrote to memory of 2540 2608 0df7144ed5104422c08fe0b6de1e2452.exe 29 PID 2608 wrote to memory of 2908 2608 0df7144ed5104422c08fe0b6de1e2452.exe 31 PID 2608 wrote to memory of 2908 2608 0df7144ed5104422c08fe0b6de1e2452.exe 31 PID 2608 wrote to memory of 2908 2608 0df7144ed5104422c08fe0b6de1e2452.exe 31 PID 2608 wrote to memory of 2908 2608 0df7144ed5104422c08fe0b6de1e2452.exe 31 PID 2608 wrote to memory of 2820 2608 0df7144ed5104422c08fe0b6de1e2452.exe 33 PID 2608 wrote to memory of 2820 2608 0df7144ed5104422c08fe0b6de1e2452.exe 33 PID 2608 wrote to memory of 2820 2608 0df7144ed5104422c08fe0b6de1e2452.exe 33 PID 2608 wrote to memory of 2820 2608 0df7144ed5104422c08fe0b6de1e2452.exe 33 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35 PID 2608 wrote to memory of 2840 2608 0df7144ed5104422c08fe0b6de1e2452.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df7144ed5104422c08fe0b6de1e2452.exe"C:\Users\Admin\AppData\Local\Temp\0df7144ed5104422c08fe0b6de1e2452.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\0df7144ed5104422c08fe0b6de1e2452.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qCBIODlFnZnhU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qCBIODlFnZnhU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE7EF.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\0df7144ed5104422c08fe0b6de1e2452.exe"C:\Users\Admin\AppData\Local\Temp\0df7144ed5104422c08fe0b6de1e2452.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5553f9ee839fe6c1b07cac4d71ba8e751
SHA1b5016ee286b38f006c554afd2c964ba56fed0831
SHA25675c064a03c307fbd92daffd8f036f7c2a882156f590a8762356beb6bf705f8f2
SHA5123c14f1e7f9f0bbb7b656a262b515eb8f3e756b93ec9a0a00e47d597e90aa7e1c529a931ab41b22ad865f6a7d048724e1debe0a0d8489feb68229ca5481d4f8f3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XLM3QGEGTCLKS6M0Z661.temp
Filesize7KB
MD5d9863021f9033251915e7733688ee7cf
SHA10cfcb5fbaf3c91c69c8f9708e098b481fbf071f7
SHA256c3be79e7277e2c102fcc514309015beb86f2d16e47a5fb2c5315f62fcf4270f0
SHA5124b7b26e66d45bfaf4b294cd2ed375051f5657a2296e7370760aea11d6d85ab767dc40f28891ba6daa404a8d1e201576ffb5c1a7f567a28b83bbe22f9cb68f4d1