Analysis
-
max time kernel
148s -
max time network
193s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
18-05-2021 19:51
Static task
static1
Behavioral task
behavioral1
Sample
a35219fe6193aeef80d635355b36acb8.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
a35219fe6193aeef80d635355b36acb8.exe
Resource
win10v20210408
General
-
Target
a35219fe6193aeef80d635355b36acb8.exe
-
Size
591KB
-
MD5
a35219fe6193aeef80d635355b36acb8
-
SHA1
8939a982a71466ddb9cf55ffef8461afc9035694
-
SHA256
b9c886eb7a2ac9a654c0bf3639c98125b14f5ae64cf26d36a26edbdb09e4ec3f
-
SHA512
755a56f2dc66a1361d20d22253a70fa13c3d3a3a7bcccb25ef68e1028657f3acc5cfb14c88ea71d23c33f841ef146a9e9290d014a61b98c4d2c77f0528495115
Malware Config
Extracted
redline
TOOL
45.140.146.214:20498
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/660-64-0x0000000000400000-0x000000000041C000-memory.dmp family_redline behavioral1/memory/660-65-0x0000000000416082-mapping.dmp family_redline behavioral1/memory/660-66-0x0000000000400000-0x000000000041C000-memory.dmp family_redline -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1724-63-0x0000000000250000-0x000000000025A000-memory.dmp agile_net -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a35219fe6193aeef80d635355b36acb8.exedescription pid process target process PID 1724 set thread context of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a35219fe6193aeef80d635355b36acb8.exea35219fe6193aeef80d635355b36acb8.exedescription pid process Token: SeDebugPrivilege 1724 a35219fe6193aeef80d635355b36acb8.exe Token: SeDebugPrivilege 660 a35219fe6193aeef80d635355b36acb8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a35219fe6193aeef80d635355b36acb8.exedescription pid process target process PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe PID 1724 wrote to memory of 660 1724 a35219fe6193aeef80d635355b36acb8.exe a35219fe6193aeef80d635355b36acb8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a35219fe6193aeef80d635355b36acb8.exe"C:\Users\Admin\AppData\Local\Temp\a35219fe6193aeef80d635355b36acb8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\a35219fe6193aeef80d635355b36acb8.exeC:\Users\Admin\AppData\Local\Temp\a35219fe6193aeef80d635355b36acb8.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:660
-