Analysis
-
max time kernel
136s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14-04-2022 11:56
Static task
static1
Behavioral task
behavioral1
Sample
4407a748e233449d07c814035d0e56db.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
4407a748e233449d07c814035d0e56db.exe
Resource
win10v2004-en-20220113
General
-
Target
4407a748e233449d07c814035d0e56db.exe
-
Size
1.9MB
-
MD5
4407a748e233449d07c814035d0e56db
-
SHA1
1dbc95d08dbae1fc1d6e6a4e2f87581ff25c7ec0
-
SHA256
2c047c4411660565df6518a63bb51220e78a0b51fecdc0c746b270597377669e
-
SHA512
e50f350f04a15d9391231a7a61b4c61eaa3c3e8518bd48a9dde2fb63fec873b861e147982764308e9f7daca3d3f40f4ca2256cd6defeb304b9cde073a820fbb4
Malware Config
Extracted
redline
@ansdvsvsvd
46.8.220.88:65531
-
auth_value
d7b874c6650abbcb219b4f56f4676fee
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral2/memory/400-132-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 400 2116 4407a748e233449d07c814035d0e56db.exe 82 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 400 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 400 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2116 wrote to memory of 400 2116 4407a748e233449d07c814035d0e56db.exe 82 PID 2116 wrote to memory of 400 2116 4407a748e233449d07c814035d0e56db.exe 82 PID 2116 wrote to memory of 400 2116 4407a748e233449d07c814035d0e56db.exe 82 PID 2116 wrote to memory of 400 2116 4407a748e233449d07c814035d0e56db.exe 82 PID 2116 wrote to memory of 400 2116 4407a748e233449d07c814035d0e56db.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4407a748e233449d07c814035d0e56db.exe"C:\Users\Admin\AppData\Local\Temp\4407a748e233449d07c814035d0e56db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:400
-