Analysis
-
max time kernel
91s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-04-2022 10:57
Static task
static1
Behavioral task
behavioral1
Sample
StartGame.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
StartGame.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
StartGame.exe
-
Size
1.8MB
-
MD5
25c21aab69d1e63b0c9c60475b802bfd
-
SHA1
c3821a2f7e19ad83b867be99a43d56980f30640b
-
SHA256
cd0f9aa670c5bad5db2db4c3b98dca1449863b827a5c83a9f7891a60d97d2363
-
SHA512
d41fee747cd5e90a79c5d0bdf510f2aee8d5c1d680541b8c4ed9b7d4f5d83c4192eb5b5600ac286e38f4d8a9fd59e6793a7b08e6a9aee030ac7978fbe902441a
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
1
C2
65.108.3.162:19747
Attributes
-
auth_value
95517c2a2f56575288c35d9dfde4a6aa
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral2/memory/1364-133-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4416 set thread context of 1364 4416 StartGame.exe 80 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1364 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1364 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4416 wrote to memory of 1364 4416 StartGame.exe 80 PID 4416 wrote to memory of 1364 4416 StartGame.exe 80 PID 4416 wrote to memory of 1364 4416 StartGame.exe 80 PID 4416 wrote to memory of 1364 4416 StartGame.exe 80 PID 4416 wrote to memory of 1364 4416 StartGame.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\StartGame.exe"C:\Users\Admin\AppData\Local\Temp\StartGame.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-