Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-07-2022 12:45
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
tmp.exe
-
Size
1.2MB
-
MD5
455400def1f221f6947098b7f8b744b2
-
SHA1
e0a33de435792d33be25ee3a667b29b780dfac5e
-
SHA256
cc265c5d066b1eb28af641a7676061e145955fbee0e410dc5fdfb8bdb9676695
-
SHA512
6960f5831259c23a3c56b85cbced1512e7063ca313baddb8423ec43a11f9bfc34aeee6e6f57396ca18b84e07c2c21b483c820bc79f0505fd6cd88dd7662f9e3c
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
76
C2
139.99.32.83:43199
Attributes
-
auth_value
44d461325298129ed3c705440f57962c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/36588-131-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1488 set thread context of 36588 1488 tmp.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
tmp.exedescription pid process target process PID 1488 wrote to memory of 36588 1488 tmp.exe AppLaunch.exe PID 1488 wrote to memory of 36588 1488 tmp.exe AppLaunch.exe PID 1488 wrote to memory of 36588 1488 tmp.exe AppLaunch.exe PID 1488 wrote to memory of 36588 1488 tmp.exe AppLaunch.exe PID 1488 wrote to memory of 36588 1488 tmp.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/36588-130-0x0000000000000000-mapping.dmp
-
memory/36588-131-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/36588-136-0x0000000005730000-0x0000000005D48000-memory.dmpFilesize
6.1MB
-
memory/36588-137-0x00000000051B0000-0x00000000051C2000-memory.dmpFilesize
72KB
-
memory/36588-138-0x00000000052E0000-0x00000000053EA000-memory.dmpFilesize
1.0MB
-
memory/36588-139-0x0000000005210000-0x000000000524C000-memory.dmpFilesize
240KB