Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
Zoom.exe
Resource
win10v2004-20250314-en
6 signatures
150 seconds
General
-
Target
Zoom.exe
-
Size
1.0MB
-
MD5
3ded2b22f85e0720a350969315ce9575
-
SHA1
7177823472026652dd739aae3c73aec6e2f0b220
-
SHA256
0e9ebbf4391a1ce11ceecab0c0699a229a7f2a20b9909600310db15b1b3cf772
-
SHA512
1c5e21ff06477efc90fb7a78d0300faad58677b836fc4838486faaa8780a99f38eaa445d521c20980935094cbedceedb4c89454badb88bbcdaed13f427bc5ff3
-
SSDEEP
24576:Fem/E/ob86A6X5EdNWbHh3v2V6X5EdNWbHh3v2st:MmsgIn+5ETwJ++5ETwJ/
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
zoom
C2
us02web-zoom.icu:1912
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1224-0-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Redline family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4896 set thread context of 1224 4896 Zoom.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4896 wrote to memory of 4124 4896 Zoom.exe 87 PID 4896 wrote to memory of 4124 4896 Zoom.exe 87 PID 4896 wrote to memory of 4124 4896 Zoom.exe 87 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88 PID 4896 wrote to memory of 1224 4896 Zoom.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zoom.exe"C:\Users\Admin\AppData\Local\Temp\Zoom.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:4124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1224
-