Analysis
-
max time kernel
4294208s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
22-03-2022 19:17
Static task
static1
Behavioral task
behavioral1
Sample
51396197.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
51396197.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
51396197.exe
-
Size
490KB
-
MD5
299b400d98ec9cd5115e1d969c915bdf
-
SHA1
2a53cd1d2380ce1115fcf891a8f9f53a5f6f6e65
-
SHA256
286bb7855ae2d5a4963f4cefb78127cedff7ce7755e6da993be7c45c76676dd9
-
SHA512
b837c5d7476234e9e7878fb8d44c5c0753fe697e187465735e6638943ffb164cef1677981490aea08d146bd4a59889c156f8052f9b25b674a1e941a87cf62540
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
eu
C2
78.47.178.190:24520
Attributes
-
auth_value
54fe6111ca0a53cc008202163fe15980
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/764-61-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/764-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/764-65-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/764-67-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/764-69-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
51396197.exedescription pid process target process PID 792 set thread context of 764 792 51396197.exe 51396197.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
51396197.exedescription pid process target process PID 792 wrote to memory of 660 792 51396197.exe 51396197.exe PID 792 wrote to memory of 660 792 51396197.exe 51396197.exe PID 792 wrote to memory of 660 792 51396197.exe 51396197.exe PID 792 wrote to memory of 660 792 51396197.exe 51396197.exe PID 792 wrote to memory of 332 792 51396197.exe 51396197.exe PID 792 wrote to memory of 332 792 51396197.exe 51396197.exe PID 792 wrote to memory of 332 792 51396197.exe 51396197.exe PID 792 wrote to memory of 332 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe PID 792 wrote to memory of 764 792 51396197.exe 51396197.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51396197.exe"C:\Users\Admin\AppData\Local\Temp\51396197.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\51396197.exeC:\Users\Admin\AppData\Local\Temp\51396197.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\51396197.exeC:\Users\Admin\AppData\Local\Temp\51396197.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\51396197.exeC:\Users\Admin\AppData\Local\Temp\51396197.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/764-57-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/764-59-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/764-61-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/764-63-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/764-65-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/764-67-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/764-69-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/764-70-0x0000000074DE0000-0x00000000754CE000-memory.dmpFilesize
6.9MB
-
memory/764-71-0x0000000004280000-0x0000000004281000-memory.dmpFilesize
4KB
-
memory/792-54-0x00000000001B0000-0x0000000000232000-memory.dmpFilesize
520KB
-
memory/792-55-0x0000000074E50000-0x000000007553E000-memory.dmpFilesize
6.9MB
-
memory/792-56-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB