Analysis
-
max time kernel
4294210s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
23-03-2022 04:48
Static task
static1
Behavioral task
behavioral1
Sample
65360019.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
65360019.exe
Resource
win10v2004-20220310-en
General
-
Target
65360019.exe
-
Size
4.6MB
-
MD5
8daaa6e60c0c7287492aabf5614967ca
-
SHA1
bc63fc6924c57b09d310288cca7eecda6c64a0b7
-
SHA256
aa0b78eec724b44accdd3d1d0bd7f6b775664acb4333328269c4cf6f4dd190f8
-
SHA512
ba72f9f44aff4bd0ec34df893f81ba60a6aff935c167765964a88b902c887b0be62b9a75acf25ab0f3a4c3b4de59055c540820a71e22eebd9bef3a8b86fbd6b7
Malware Config
Extracted
redline
@JABKA9983
95.214.8.54:25565
-
auth_value
6da5168841968f263b7c520ddc0c88b3
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1056-66-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1056-71-0x0000000000419072-mapping.dmp family_redline behavioral1/memory/1056-72-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1056-73-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
65360019.exedescription pid process target process PID 1996 set thread context of 1056 1996 65360019.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
65360019.exepid process 1996 65360019.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
65360019.exedescription pid process target process PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe PID 1996 wrote to memory of 1056 1996 65360019.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65360019.exe"C:\Users\Admin\AppData\Local\Temp\65360019.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1056
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1056-66-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1056-64-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1056-71-0x0000000000419072-mapping.dmp
-
memory/1056-72-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1056-73-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1056-74-0x0000000075041000-0x0000000075043000-memory.dmpFilesize
8KB
-
memory/1996-54-0x00000000002D0000-0x0000000000330000-memory.dmpFilesize
384KB
-
memory/1996-55-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1996-57-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1996-59-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1996-60-0x0000000000400000-0x0000000000B7F000-memory.dmpFilesize
7.5MB
-
memory/1996-63-0x0000000000400000-0x0000000000B7F000-memory.dmpFilesize
7.5MB