Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2022 10:50
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1.2MB
-
MD5
455400def1f221f6947098b7f8b744b2
-
SHA1
e0a33de435792d33be25ee3a667b29b780dfac5e
-
SHA256
cc265c5d066b1eb28af641a7676061e145955fbee0e410dc5fdfb8bdb9676695
-
SHA512
6960f5831259c23a3c56b85cbced1512e7063ca313baddb8423ec43a11f9bfc34aeee6e6f57396ca18b84e07c2c21b483c820bc79f0505fd6cd88dd7662f9e3c
-
SSDEEP
24576:unEweSxfwe0eTyaXXVz55jd2UbWCAxE/:u8cewf5gU6CA
Malware Config
Extracted
redline
76
139.99.32.83:43199
-
auth_value
44d461325298129ed3c705440f57962c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/37164-133-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmp.exedescription pid process target process PID 1140 set thread context of 37164 1140 tmp.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
tmp.exedescription pid process target process PID 1140 wrote to memory of 37164 1140 tmp.exe AppLaunch.exe PID 1140 wrote to memory of 37164 1140 tmp.exe AppLaunch.exe PID 1140 wrote to memory of 37164 1140 tmp.exe AppLaunch.exe PID 1140 wrote to memory of 37164 1140 tmp.exe AppLaunch.exe PID 1140 wrote to memory of 37164 1140 tmp.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/37164-132-0x0000000000000000-mapping.dmp
-
memory/37164-133-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/37164-138-0x0000000005C70000-0x0000000006288000-memory.dmpFilesize
6.1MB
-
memory/37164-139-0x0000000005700000-0x0000000005712000-memory.dmpFilesize
72KB
-
memory/37164-140-0x0000000005830000-0x000000000593A000-memory.dmpFilesize
1.0MB
-
memory/37164-141-0x0000000005760000-0x000000000579C000-memory.dmpFilesize
240KB