Overview
overview
10Static
static
3R B X 9 5.rar
windows7-x64
3R B X 9 5.rar
windows10-2004-x64
3R B X 9 5/Client.exe
windows7-x64
1R B X 9 5/Client.exe
windows10-2004-x64
1R B X 9 5/...or.exe
windows7-x64
7R B X 9 5/...or.exe
windows10-2004-x64
10R B X 9 5/ai.cfg
windows7-x64
3R B X 9 5/ai.cfg
windows10-2004-x64
3R B X 9 5/cacert.pem
windows7-x64
3R B X 9 5/cacert.pem
windows10-2004-x64
3R B X 9 5/config.vdf
windows7-x64
3R B X 9 5/config.vdf
windows10-2004-x64
3Analysis
-
max time kernel
68s -
max time network
70s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
R B X 9 5.rar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
R B X 9 5.rar
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
R B X 9 5/Client.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
R B X 9 5/Client.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
R B X 9 5/Roblox Executor.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
R B X 9 5/Roblox Executor.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
R B X 9 5/ai.cfg
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
R B X 9 5/ai.cfg
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
R B X 9 5/cacert.pem
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
R B X 9 5/cacert.pem
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
R B X 9 5/config.vdf
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
R B X 9 5/config.vdf
Resource
win10v2004-20240611-en
General
-
Target
R B X 9 5/Roblox Executor.exe
-
Size
359KB
-
MD5
e3106b33d419c2b1d7920d8f55e0b5c8
-
SHA1
3bfc3ec1727477c0df43644268d4c9ebdea00662
-
SHA256
cea6948d7fcd91a07f883c0216bbf0c8a71bbbd860b8752d965ff4421d2ec01f
-
SHA512
01113183c50a1eab161b5117b96a856ce457c3a30f9dcad949cd4e9020e72409be2a4e56fce7f523bd648daa1aed06e2a1f1c3ae0f3bfb6b0520e979986a9f50
-
SSDEEP
6144:afP6YNEL+sAO6gaZKKfL2GKfaVeV+mTlEIwrjef7UBgHvMW7xJpg1vLfIGfXP:af10AYaZZDi7VTlfwrjef7UBgHvMW7xi
Malware Config
Extracted
redline
185.196.9.26:6302
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral6/memory/756-9-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Loads dropped DLL 1 IoCs
Processes:
Roblox Executor.exepid process 3596 Roblox Executor.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Roblox Executor.exedescription pid process target process PID 3596 set thread context of 756 3596 Roblox Executor.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
MSBuild.exepid process 756 MSBuild.exe 756 MSBuild.exe 756 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MSBuild.exedescription pid process Token: SeDebugPrivilege 756 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Roblox Executor.exedescription pid process target process PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe PID 3596 wrote to memory of 756 3596 Roblox Executor.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\R B X 9 5\Roblox Executor.exe"C:\Users\Admin\AppData\Local\Temp\R B X 9 5\Roblox Executor.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\d3d9.dllFilesize
424KB
MD5ec28aef5418f7157f9e826983146133c
SHA1ce3d2ea83b283f32f9d8a162f5a6393eab5572a2
SHA256adf0a47152697ea16658d2af4986ed1d0248c31421c548dbeb8d05d6c1beb6d9
SHA5123755fa7d8afd9e51946c4f41ac651175ada3623355a4602666f0a338323dd72906dfdcfe9c4b5f73aeef6db5ea4d5e6d281694daf9a3f863859ce38cb4e016d7
-
memory/756-21-0x0000000005820000-0x000000000585C000-memory.dmpFilesize
240KB
-
memory/756-23-0x00000000060C0000-0x0000000006126000-memory.dmpFilesize
408KB
-
memory/756-18-0x00000000065C0000-0x0000000006BD8000-memory.dmpFilesize
6.1MB
-
memory/756-9-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/756-16-0x00000000056D0000-0x00000000056DA000-memory.dmpFilesize
40KB
-
memory/756-28-0x0000000074DF0000-0x00000000755A0000-memory.dmpFilesize
7.7MB
-
memory/756-13-0x0000000074DF0000-0x00000000755A0000-memory.dmpFilesize
7.7MB
-
memory/756-14-0x00000000059F0000-0x0000000005F94000-memory.dmpFilesize
5.6MB
-
memory/756-19-0x00000000058B0000-0x00000000059BA000-memory.dmpFilesize
1.0MB
-
memory/756-17-0x0000000074DF0000-0x00000000755A0000-memory.dmpFilesize
7.7MB
-
memory/756-26-0x0000000007130000-0x0000000007180000-memory.dmpFilesize
320KB
-
memory/756-25-0x0000000007880000-0x0000000007DAC000-memory.dmpFilesize
5.2MB
-
memory/756-15-0x0000000005520000-0x00000000055B2000-memory.dmpFilesize
584KB
-
memory/756-20-0x00000000057C0000-0x00000000057D2000-memory.dmpFilesize
72KB
-
memory/756-24-0x0000000007180000-0x0000000007342000-memory.dmpFilesize
1.8MB
-
memory/756-22-0x0000000005860000-0x00000000058AC000-memory.dmpFilesize
304KB
-
memory/3596-2-0x0000000005830000-0x0000000005836000-memory.dmpFilesize
24KB
-
memory/3596-0-0x0000000074DFE000-0x0000000074DFF000-memory.dmpFilesize
4KB
-
memory/3596-1-0x0000000000DA0000-0x0000000000E04000-memory.dmpFilesize
400KB
-
memory/3596-29-0x0000000074DF0000-0x00000000755A0000-memory.dmpFilesize
7.7MB
-
memory/3596-12-0x0000000074DF0000-0x00000000755A0000-memory.dmpFilesize
7.7MB
-
memory/3596-11-0x0000000077891000-0x00000000779B1000-memory.dmpFilesize
1.1MB