Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
Zoom.exe
Resource
win10v2004-20250314-en
6 signatures
150 seconds
General
-
Target
Zoom.exe
-
Size
1.0MB
-
MD5
3ded2b22f85e0720a350969315ce9575
-
SHA1
7177823472026652dd739aae3c73aec6e2f0b220
-
SHA256
0e9ebbf4391a1ce11ceecab0c0699a229a7f2a20b9909600310db15b1b3cf772
-
SHA512
1c5e21ff06477efc90fb7a78d0300faad58677b836fc4838486faaa8780a99f38eaa445d521c20980935094cbedceedb4c89454badb88bbcdaed13f427bc5ff3
-
SSDEEP
24576:Fem/E/ob86A6X5EdNWbHh3v2V6X5EdNWbHh3v2st:MmsgIn+5ETwJ++5ETwJ/
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
zoom
C2
us02web-zoom.icu:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/5292-0-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3228 set thread context of 5292 3228 Zoom.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3228 wrote to memory of 5292 3228 Zoom.exe 86 PID 3228 wrote to memory of 5292 3228 Zoom.exe 86 PID 3228 wrote to memory of 5292 3228 Zoom.exe 86 PID 3228 wrote to memory of 5292 3228 Zoom.exe 86 PID 3228 wrote to memory of 5292 3228 Zoom.exe 86 PID 3228 wrote to memory of 5292 3228 Zoom.exe 86 PID 3228 wrote to memory of 5292 3228 Zoom.exe 86 PID 3228 wrote to memory of 5292 3228 Zoom.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zoom.exe"C:\Users\Admin\AppData\Local\Temp\Zoom.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5292
-