Analysis
-
max time kernel
159s -
max time network
167s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
08-02-2022 04:44
Static task
static1
Behavioral task
behavioral1
Sample
56da9aa053adec2eb685d9f81532ad23.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
56da9aa053adec2eb685d9f81532ad23.exe
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
56da9aa053adec2eb685d9f81532ad23.exe
-
Size
491KB
-
MD5
56da9aa053adec2eb685d9f81532ad23
-
SHA1
58e47cd4abf19c6a2ddc5d5dc2cbad2e90f68a32
-
SHA256
18354bab9009498b48010c0acb0eba274eba5b9d27f197b773b9c376d7932167
-
SHA512
a7526356ae35dc95d0c90fbb5779db0fe01b1f09a00553e064bbf53310e881215aa00256558fdf3ff7f457f450dd23c5b5b009b59da5625cc78cae76ff376a36
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
GIZMIK
C2
185.215.113.107:1433
Attributes
-
auth_value
b9102ed52a68ee77f4e68f740474332e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
resource yara_rule behavioral1/memory/1656-61-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1656-62-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1656-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1656-64-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1316 set thread context of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29 PID 1316 wrote to memory of 1656 1316 56da9aa053adec2eb685d9f81532ad23.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exe"C:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exeC:\Users\Admin\AppData\Local\Temp\56da9aa053adec2eb685d9f81532ad23.exe2⤵PID:1656
-