Analysis
-
max time kernel
51s -
max time network
53s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-12-2020 19:58
Static task
static1
Behavioral task
behavioral1
Sample
efd360b2356c73705b720b6a75fb5376.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
efd360b2356c73705b720b6a75fb5376.exe
Resource
win10v20201028
General
-
Target
efd360b2356c73705b720b6a75fb5376.exe
-
Size
1.1MB
-
MD5
efd360b2356c73705b720b6a75fb5376
-
SHA1
6bf80e400bad4ad4755c2d6cfb987dc3a999316a
-
SHA256
5637daf1b0a5e312bf2118b89083c186fa32f074a12006ef7df0e49ce51f40c1
-
SHA512
d7c9624c1715b70528d5e54a0f3281c4a9d2c0ac15230401cd12b976df4108c65364f274d42b5f8389ba1361b7ae12c9460630cccc47b32b1098bc64722e47fa
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1712-8-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral1/memory/1712-9-0x0000000000420CEA-mapping.dmp family_redline behavioral1/memory/1712-11-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral1/memory/1712-10-0x0000000000400000-0x0000000000426000-memory.dmp family_redline -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.amazonaws.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
efd360b2356c73705b720b6a75fb5376.exedescription pid process target process PID 596 set thread context of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
InstallUtil.exepid process 1712 InstallUtil.exe 1712 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
efd360b2356c73705b720b6a75fb5376.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 596 efd360b2356c73705b720b6a75fb5376.exe Token: SeDebugPrivilege 1712 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
efd360b2356c73705b720b6a75fb5376.exedescription pid process target process PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe PID 596 wrote to memory of 1712 596 efd360b2356c73705b720b6a75fb5376.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\efd360b2356c73705b720b6a75fb5376.exe"C:\Users\Admin\AppData\Local\Temp\efd360b2356c73705b720b6a75fb5376.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712