Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
23-03-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
b278d2601750d7ad2090a7801e377396.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
b278d2601750d7ad2090a7801e377396.exe
Resource
win10v2004-en-20220113
General
-
Target
b278d2601750d7ad2090a7801e377396.exe
-
Size
566KB
-
MD5
b278d2601750d7ad2090a7801e377396
-
SHA1
8e4cabd6ffb0c36d89bfb7ee9b7705a7d76fbb9f
-
SHA256
df16f9d39345c1a3a1ed404fc6a7c3e5482952e4fa36a7913eb3cddc97950d1c
-
SHA512
41f6afe9f0b429cf5504fefc6ccaaeb00078fce572d16f0ce1cc8caeed9085868f00be4914c61b205269a7e63c5fdc6ea2aa4a638ed7867ace6fe721248c806d
Malware Config
Extracted
redline
nam33
103.133.111.182:44839
-
auth_value
8b278c0f8c2de9225b1633fa0e83ddce
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3680-133-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b278d2601750d7ad2090a7801e377396.exedescription pid process target process PID 3592 set thread context of 3680 3592 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AppLaunch.exepid process 3680 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3680 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
b278d2601750d7ad2090a7801e377396.exedescription pid process target process PID 3592 wrote to memory of 3680 3592 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 3592 wrote to memory of 3680 3592 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 3592 wrote to memory of 3680 3592 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 3592 wrote to memory of 3680 3592 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe PID 3592 wrote to memory of 3680 3592 b278d2601750d7ad2090a7801e377396.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b278d2601750d7ad2090a7801e377396.exe"C:\Users\Admin\AppData\Local\Temp\b278d2601750d7ad2090a7801e377396.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-