Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
21-12-2021 22:19
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe
Resource
win10-en-20211208
General
-
Target
SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe
-
Size
5.9MB
-
MD5
24d7b3e065cb0570a44a101641acd8b4
-
SHA1
7f71838113850cf07bebfe1da7a9211a7119a579
-
SHA256
75d85fc34ed91e2de083d9342c41e2966bce7beab75732e3e1316ee62e550e9c
-
SHA512
a7b9258d1e65f95461bbbb70169d29697c33e9ef348f850a76d866d9163f6e657275267a7b11f0a4032b3471d47095c471b0a22a7b9aacb432e912138cc40bbf
Malware Config
Extracted
redline
444
31.131.254.105:1498
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3284-127-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/3284-132-0x0000000000419322-mapping.dmp family_redline behavioral2/memory/3284-140-0x0000000004D00000-0x0000000005306000-memory.dmp family_redline -
Processes:
resource yara_rule behavioral2/memory/2656-123-0x0000000001090000-0x0000000001B41000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exepid process 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exedescription pid process target process PID 2656 set thread context of 3284 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exeRegSvcs.exepid process 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe 3284 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 3284 RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exedescription pid process target process PID 2656 wrote to memory of 3284 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe RegSvcs.exe PID 2656 wrote to memory of 3284 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe RegSvcs.exe PID 2656 wrote to memory of 3284 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe RegSvcs.exe PID 2656 wrote to memory of 3284 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe RegSvcs.exe PID 2656 wrote to memory of 3284 2656 SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetect.malware1.26274.17388.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2656-115-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/2656-116-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/2656-117-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/2656-118-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/2656-119-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/2656-120-0x0000000000C20000-0x0000000000C21000-memory.dmpFilesize
4KB
-
memory/2656-122-0x0000000000F60000-0x0000000000F61000-memory.dmpFilesize
4KB
-
memory/2656-123-0x0000000001090000-0x0000000001B41000-memory.dmpFilesize
10.7MB
-
memory/2656-126-0x0000000000F50000-0x0000000000F51000-memory.dmpFilesize
4KB
-
memory/3284-127-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3284-132-0x0000000000419322-mapping.dmp
-
memory/3284-133-0x0000000000400000-0x0000000000401000-memory.dmpFilesize
4KB
-
memory/3284-135-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/3284-136-0x0000000004D70000-0x0000000004D71000-memory.dmpFilesize
4KB
-
memory/3284-137-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/3284-138-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/3284-139-0x0000000004E10000-0x0000000004E11000-memory.dmpFilesize
4KB
-
memory/3284-140-0x0000000004D00000-0x0000000005306000-memory.dmpFilesize
6.0MB
-
memory/3284-141-0x0000000005120000-0x0000000005121000-memory.dmpFilesize
4KB
-
memory/3284-142-0x0000000006120000-0x0000000006121000-memory.dmpFilesize
4KB
-
memory/3284-143-0x0000000005CD0000-0x0000000005CD1000-memory.dmpFilesize
4KB
-
memory/3284-144-0x0000000005DF0000-0x0000000005DF1000-memory.dmpFilesize
4KB
-
memory/3284-145-0x0000000005F90000-0x0000000005F91000-memory.dmpFilesize
4KB
-
memory/3284-146-0x0000000006040000-0x0000000006041000-memory.dmpFilesize
4KB
-
memory/3284-147-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB
-
memory/3284-148-0x0000000007DA0000-0x0000000007DA1000-memory.dmpFilesize
4KB