Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-10-2021 13:41
Static task
static1
Behavioral task
behavioral1
Sample
Full-Setup.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
Full-Setup.exe
Resource
win10-en-20210920
General
-
Target
Full-Setup.exe
-
Size
617KB
-
MD5
3e51441dbc25e639574078fe3beba68b
-
SHA1
1a4de23d68342dffb53efac5e9dcf102a66adea4
-
SHA256
53a144e5fd49272bbcbe6b46fb8bf54488cdedbd7b767b8128e43e709a7b929b
-
SHA512
38793d4faa8b30246988eb03b85618e6b363e8bcfefa03c6b04a975e748060737a2978d05541dbcad5334dd77665f9e19dda169d63e424e630c2db6a3c8d3c6a
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4052-121-0x0000000000400000-0x0000000000430000-memory.dmp family_redline behavioral2/memory/4052-122-0x0000000000418DC2-mapping.dmp family_redline behavioral2/memory/4052-132-0x0000000004F30000-0x000000000542E000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Full-Setup.exedescription pid process target process PID 4260 set thread context of 4052 4260 Full-Setup.exe Full-Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Full-Setup.exepid process 4052 Full-Setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Full-Setup.exedescription pid process Token: SeDebugPrivilege 4052 Full-Setup.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Full-Setup.exedescription pid process target process PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe PID 4260 wrote to memory of 4052 4260 Full-Setup.exe Full-Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Full-Setup.exe"C:\Users\Admin\AppData\Local\Temp\Full-Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\Full-Setup.exeC:\Users\Admin\AppData\Local\Temp\Full-Setup.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034