Analysis
-
max time kernel
54s -
max time network
185s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16-08-2022 22:17
Static task
static1
Behavioral task
behavioral1
Sample
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe
Resource
win10-20220812-en
General
-
Target
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe
-
Size
3.9MB
-
MD5
70c4a1e5ce70e0ec16fc0c6d0f0384d9
-
SHA1
2533d9a175e8617512fba948557a302c7d4683a2
-
SHA256
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024
-
SHA512
576b48ff847c2fac88d5f48133cc7ce36ddfeccb923fcdcb9847b7a9586cc531b2507557c24bb9889b6a4f7db5b864a5a316136b32c151cce2bae034fda9a89a
Malware Config
Extracted
redline
193.106.191.160:8673
-
auth_value
a92e5e3459b5f1ea8a76ec4f05c50c1e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2344-126-0x0000000000400000-0x0000000000AAD000-memory.dmp family_redline behavioral2/memory/214888-130-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/214888-135-0x000000000041B50E-mapping.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exedescription pid process target process PID 2344 set thread context of 214888 2344 ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AppLaunch.exepid process 214888 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 214888 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exedescription pid process target process PID 2344 wrote to memory of 214888 2344 ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe AppLaunch.exe PID 2344 wrote to memory of 214888 2344 ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe AppLaunch.exe PID 2344 wrote to memory of 214888 2344 ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe AppLaunch.exe PID 2344 wrote to memory of 214888 2344 ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe AppLaunch.exe PID 2344 wrote to memory of 214888 2344 ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe"C:\Users\Admin\AppData\Local\Temp\ba4f41c49113e6f68569cabb3b7c9f4dccdab49668b2342badb199e4a5a25024.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:214888