Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
23-03-2022 21:23
Static task
static1
Behavioral task
behavioral1
Sample
88600217.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
88600217.exe
Resource
win10v2004-en-20220113
General
-
Target
88600217.exe
-
Size
4.6MB
-
MD5
42c773c233daa41deb6cd9aaa3265a1f
-
SHA1
3178217f4cb7cbd95a6f286717800a8a48bb4fd7
-
SHA256
1176b04e2fafb75121c0123af0056d080ef97bf98f4fef47ffd7a48d55910db8
-
SHA512
bae421dc2ba0fb0b99b2f2155e16a575ba3299ef9f341b6110af95dfda8caf6e3c8dc36f182fd14f17adacc59eee160c655244b7e44ace6d9df043b130617071
Malware Config
Extracted
redline
@zhilsholi
yabynennet.xyz:81
-
auth_value
c2d0b7a2ede97b91495c99e75b4f27fb
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2772-136-0x0000000000430000-0x0000000000450000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
88600217.exedescription pid process target process PID 1516 set thread context of 2772 1516 88600217.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
88600217.exepid process 1516 88600217.exe 1516 88600217.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
88600217.exedescription pid process target process PID 1516 wrote to memory of 2772 1516 88600217.exe AppLaunch.exe PID 1516 wrote to memory of 2772 1516 88600217.exe AppLaunch.exe PID 1516 wrote to memory of 2772 1516 88600217.exe AppLaunch.exe PID 1516 wrote to memory of 2772 1516 88600217.exe AppLaunch.exe PID 1516 wrote to memory of 2772 1516 88600217.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88600217.exe"C:\Users\Admin\AppData\Local\Temp\88600217.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1516-130-0x00000000026E0000-0x0000000002740000-memory.dmpFilesize
384KB
-
memory/1516-131-0x0000000000400000-0x000000000093D000-memory.dmpFilesize
5.2MB
-
memory/1516-133-0x00000000028A0000-0x00000000028A1000-memory.dmpFilesize
4KB
-
memory/1516-134-0x0000000000400000-0x000000000093D000-memory.dmpFilesize
5.2MB
-
memory/1516-141-0x0000000000400000-0x000000000093D000-memory.dmpFilesize
5.2MB
-
memory/2772-135-0x0000000000000000-mapping.dmp
-
memory/2772-136-0x0000000000430000-0x0000000000450000-memory.dmpFilesize
128KB
-
memory/2772-142-0x0000000004F80000-0x0000000005598000-memory.dmpFilesize
6.1MB
-
memory/2772-143-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/2772-144-0x0000000004B50000-0x0000000004C5A000-memory.dmpFilesize
1.0MB
-
memory/2772-145-0x0000000004A80000-0x0000000004ABC000-memory.dmpFilesize
240KB