Analysis
-
max time kernel
118s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
13-04-2022 19:42
Static task
static1
Behavioral task
behavioral1
Sample
503fb1498e1c257cf61ade325e9a3a60.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
503fb1498e1c257cf61ade325e9a3a60.exe
Resource
win10v2004-20220310-en
General
-
Target
503fb1498e1c257cf61ade325e9a3a60.exe
-
Size
491KB
-
MD5
503fb1498e1c257cf61ade325e9a3a60
-
SHA1
786094aece0a643b4924b02ef98b82c8585394f1
-
SHA256
32c1e1a834294cc3b4ce9c790c8faf4bd218412859b55b21129ffe991064eeae
-
SHA512
4b8eb12a82275ae1e084a76aea4293bc502ec71bfef100bf0391e836b520701374430415aac6a5b6b9bf89e815b989f87c0505721d2cbd153b040239c2d246e1
Malware Config
Extracted
redline
AUS
147.189.161.112:42516
-
auth_value
2e0aea8f686e4f39fb1ab50a9d815c7c
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
resource yara_rule behavioral2/memory/3360-138-0x0000000000000000-mapping.dmp family_redline behavioral2/memory/3360-139-0x0000000000400000-0x0000000000430000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1416 set thread context of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3360 503fb1498e1c257cf61ade325e9a3a60.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3360 503fb1498e1c257cf61ade325e9a3a60.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77 PID 1416 wrote to memory of 3360 1416 503fb1498e1c257cf61ade325e9a3a60.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\503fb1498e1c257cf61ade325e9a3a60.exe"C:\Users\Admin\AppData\Local\Temp\503fb1498e1c257cf61ade325e9a3a60.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\503fb1498e1c257cf61ade325e9a3a60.exeC:\Users\Admin\AppData\Local\Temp\503fb1498e1c257cf61ade325e9a3a60.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:824
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\503fb1498e1c257cf61ade325e9a3a60.exe.log
Filesize700B
MD5e5352797047ad2c91b83e933b24fbc4f
SHA19bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827