Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
15-10-2021 21:54
Static task
static1
Behavioral task
behavioral1
Sample
Mopes Hack.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Mopes Hack.exe
Resource
win10-en-20210920
General
-
Target
Mopes Hack.exe
-
Size
326KB
-
MD5
83e60135c26872fa756fcb26553be6cb
-
SHA1
3df616b4b4df6faba9373f78dac9a277c07cb26a
-
SHA256
e4331c8eab3a20db74f66603fac6ff6a3faca677176a4015dea2a4665fb3f13f
-
SHA512
10834fa839db185629dfce92da2334d4c69dc05041ee045c08610085febeebac054f6c5b64e5a1e259ca06144e6bdc0a91a56acbba130dd6e0aeeb8cfbb67b26
Malware Config
Extracted
redline
@silistrii_LZT
arujuyrana.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3364-115-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral2/memory/3364-120-0x000000000041B246-mapping.dmp family_redline -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1264 created 2404 1264 WerFault.exe Mopes Hack.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Mopes Hack.exedescription pid process target process PID 2404 set thread context of 3364 2404 Mopes Hack.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1264 2404 WerFault.exe Mopes Hack.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 1264 WerFault.exe Token: SeBackupPrivilege 1264 WerFault.exe Token: SeDebugPrivilege 1264 WerFault.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Mopes Hack.exedescription pid process target process PID 2404 wrote to memory of 3364 2404 Mopes Hack.exe AppLaunch.exe PID 2404 wrote to memory of 3364 2404 Mopes Hack.exe AppLaunch.exe PID 2404 wrote to memory of 3364 2404 Mopes Hack.exe AppLaunch.exe PID 2404 wrote to memory of 3364 2404 Mopes Hack.exe AppLaunch.exe PID 2404 wrote to memory of 3364 2404 Mopes Hack.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mopes Hack.exe"C:\Users\Admin\AppData\Local\Temp\Mopes Hack.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2402⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3364-115-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/3364-120-0x000000000041B246-mapping.dmp
-
memory/3364-121-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/3364-122-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/3364-123-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/3364-124-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/3364-126-0x0000000009360000-0x0000000009361000-memory.dmpFilesize
4KB
-
memory/3364-127-0x0000000008DF0000-0x0000000008DF1000-memory.dmpFilesize
4KB
-
memory/3364-128-0x0000000008F20000-0x0000000008F21000-memory.dmpFilesize
4KB
-
memory/3364-129-0x0000000008E50000-0x0000000008E51000-memory.dmpFilesize
4KB
-
memory/3364-130-0x0000000008E90000-0x0000000008E91000-memory.dmpFilesize
4KB
-
memory/3364-131-0x0000000008D50000-0x0000000009356000-memory.dmpFilesize
6.0MB
-
memory/3364-132-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB