Analysis
-
max time kernel
4294185s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
23-03-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
b278d2601750d7ad2090a7801e377396.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
b278d2601750d7ad2090a7801e377396.exe
Resource
win10v2004-en-20220113
General
-
Target
b278d2601750d7ad2090a7801e377396.exe
-
Size
566KB
-
MD5
b278d2601750d7ad2090a7801e377396
-
SHA1
8e4cabd6ffb0c36d89bfb7ee9b7705a7d76fbb9f
-
SHA256
df16f9d39345c1a3a1ed404fc6a7c3e5482952e4fa36a7913eb3cddc97950d1c
-
SHA512
41f6afe9f0b429cf5504fefc6ccaaeb00078fce572d16f0ce1cc8caeed9085868f00be4914c61b205269a7e63c5fdc6ea2aa4a638ed7867ace6fe721248c806d
Malware Config
Extracted
redline
nam33
103.133.111.182:44839
-
auth_value
8b278c0f8c2de9225b1633fa0e83ddce
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/736-58-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/736-63-0x00000000000ABCCE-mapping.dmp family_redline behavioral1/memory/736-64-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/736-65-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b278d2601750d7ad2090a7801e377396.exedescription pid process target process PID 616 set thread context of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AppLaunch.exepid process 736 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 736 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b278d2601750d7ad2090a7801e377396.exedescription pid process target process PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 616 wrote to memory of 736 616 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b278d2601750d7ad2090a7801e377396.exe"C:\Users\Admin\AppData\Local\Temp\b278d2601750d7ad2090a7801e377396.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736
-