Analysis
-
max time kernel
89s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 08:05
Static task
static1
Behavioral task
behavioral1
Sample
setup/AISetupFull.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
setup/AISetupFull.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
setup/Setup-Crack.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
setup/Setup-Crack.exe
Resource
win10v2004-20220414-en
General
-
Target
setup/AISetupFull.exe
-
Size
1.4MB
-
MD5
0d5e2cabef77bed22398de3196c1d1fd
-
SHA1
785ff4ed2cdec5ba481ec00a2966a8ea766cd549
-
SHA256
757cdbf9116e2f06fae96fabefeba0a0e524bd09e2e368b172ae2389bb5bb78c
-
SHA512
9d8914560edd9ac488d7d4daed4f6a62ab151df6568722e1bdd6526e936a5dce9c0a20e7055b43d441ce14dd5a7659c53e2c50b4aa99cf249f9256b1315e30a0
Malware Config
Extracted
redline
jn28d1
185.215.113.122:15386
-
auth_value
f464001a0e86a12ef97505647572b2c2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1828-64-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1828-66-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1828-68-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
AISetupFull.exedescription pid process target process PID 2044 set thread context of 1828 2044 AISetupFull.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
AISetupFull.exepid process 2044 AISetupFull.exe 2044 AISetupFull.exe 2044 AISetupFull.exe 2044 AISetupFull.exe 2044 AISetupFull.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
InstallUtil.exedescription pid process Token: SeDebugPrivilege 1828 InstallUtil.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
AISetupFull.exedescription pid process target process PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe PID 2044 wrote to memory of 1828 2044 AISetupFull.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup\AISetupFull.exe"C:\Users\Admin\AppData\Local\Temp\setup\AISetupFull.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1828
-