Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-06-2022 06:05
Static task
static1
Behavioral task
behavioral1
Sample
455400def1f221f6947098b7f8b744b2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
455400def1f221f6947098b7f8b744b2.exe
Resource
win10v2004-20220414-en
General
-
Target
455400def1f221f6947098b7f8b744b2.exe
-
Size
1.2MB
-
MD5
455400def1f221f6947098b7f8b744b2
-
SHA1
e0a33de435792d33be25ee3a667b29b780dfac5e
-
SHA256
cc265c5d066b1eb28af641a7676061e145955fbee0e410dc5fdfb8bdb9676695
-
SHA512
6960f5831259c23a3c56b85cbced1512e7063ca313baddb8423ec43a11f9bfc34aeee6e6f57396ca18b84e07c2c21b483c820bc79f0505fd6cd88dd7662f9e3c
Malware Config
Extracted
redline
76
139.99.32.83:43199
-
auth_value
44d461325298129ed3c705440f57962c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/36940-131-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
455400def1f221f6947098b7f8b744b2.exedescription pid process target process PID 4984 set thread context of 36940 4984 455400def1f221f6947098b7f8b744b2.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
455400def1f221f6947098b7f8b744b2.exedescription pid process target process PID 4984 wrote to memory of 36940 4984 455400def1f221f6947098b7f8b744b2.exe AppLaunch.exe PID 4984 wrote to memory of 36940 4984 455400def1f221f6947098b7f8b744b2.exe AppLaunch.exe PID 4984 wrote to memory of 36940 4984 455400def1f221f6947098b7f8b744b2.exe AppLaunch.exe PID 4984 wrote to memory of 36940 4984 455400def1f221f6947098b7f8b744b2.exe AppLaunch.exe PID 4984 wrote to memory of 36940 4984 455400def1f221f6947098b7f8b744b2.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\455400def1f221f6947098b7f8b744b2.exe"C:\Users\Admin\AppData\Local\Temp\455400def1f221f6947098b7f8b744b2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/36940-130-0x0000000000000000-mapping.dmp
-
memory/36940-131-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/36940-136-0x00000000056A0000-0x0000000005CB8000-memory.dmpFilesize
6.1MB
-
memory/36940-137-0x0000000005140000-0x0000000005152000-memory.dmpFilesize
72KB
-
memory/36940-138-0x0000000005270000-0x000000000537A000-memory.dmpFilesize
1.0MB
-
memory/36940-139-0x00000000051A0000-0x00000000051DC000-memory.dmpFilesize
240KB