Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 16:15
Static task
static1
Behavioral task
behavioral1
Sample
b5fc67332e05420980a00e2e4da7ebbc.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
b5fc67332e05420980a00e2e4da7ebbc.exe
Resource
win10-en-20210920
General
-
Target
b5fc67332e05420980a00e2e4da7ebbc.exe
-
Size
432KB
-
MD5
b5fc67332e05420980a00e2e4da7ebbc
-
SHA1
19394812eefe2e09ba724a580a5c89309fef924d
-
SHA256
a67250f4e3194d603043d506b4bc7c6112bd61a56bf3521e1ee1d95b22a17147
-
SHA512
36d95a4a4841371604a36740a93edc916786acd87e51c402dd2031f81da5ec704aa35e1bb010d7007f8233c3973a8757a962e3c49d13d091b87a3384239e7aa7
Malware Config
Extracted
redline
lyla2109
213.166.69.181:64650
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3532-121-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3532-122-0x000000000041C5E2-mapping.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5fc67332e05420980a00e2e4da7ebbc.exedescription pid process target process PID 3608 set thread context of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
b5fc67332e05420980a00e2e4da7ebbc.exedescription pid process target process PID 3608 wrote to memory of 3100 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3100 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3100 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe PID 3608 wrote to memory of 3532 3608 b5fc67332e05420980a00e2e4da7ebbc.exe b5fc67332e05420980a00e2e4da7ebbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5fc67332e05420980a00e2e4da7ebbc.exe"C:\Users\Admin\AppData\Local\Temp\b5fc67332e05420980a00e2e4da7ebbc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b5fc67332e05420980a00e2e4da7ebbc.exeC:\Users\Admin\AppData\Local\Temp\b5fc67332e05420980a00e2e4da7ebbc.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\b5fc67332e05420980a00e2e4da7ebbc.exeC:\Users\Admin\AppData\Local\Temp\b5fc67332e05420980a00e2e4da7ebbc.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b5fc67332e05420980a00e2e4da7ebbc.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
memory/3532-127-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/3532-121-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/3532-122-0x000000000041C5E2-mapping.dmp
-
memory/3532-126-0x0000000005CE0000-0x0000000005CE1000-memory.dmpFilesize
4KB
-
memory/3532-128-0x0000000005830000-0x0000000005831000-memory.dmpFilesize
4KB
-
memory/3532-129-0x0000000005760000-0x0000000005761000-memory.dmpFilesize
4KB
-
memory/3532-130-0x00000000057E0000-0x00000000057E1000-memory.dmpFilesize
4KB
-
memory/3532-131-0x00000000056D0000-0x0000000005CD6000-memory.dmpFilesize
6.0MB
-
memory/3608-118-0x0000000005690000-0x0000000005691000-memory.dmpFilesize
4KB
-
memory/3608-119-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/3608-120-0x0000000005660000-0x00000000056D6000-memory.dmpFilesize
472KB
-
memory/3608-117-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB
-
memory/3608-115-0x0000000000D50000-0x0000000000D51000-memory.dmpFilesize
4KB