Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02-09-2022 05:56
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220901-en
8 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
139KB
-
MD5
03aa45b7c20bcddac8ae49cf4ca737c8
-
SHA1
e7eea8b0987a1b9cd5703debbd016d7efed8bf0a
-
SHA256
71200e09252115d52bb62c8810413bccebe56e58ba070347c7b5d827396a6d44
-
SHA512
420c71eabbdd191c1719233a48bd4d68a73ace463ceeb600223ade9daa6f8cecf0b88a38b32286ff9f10f26a237c411d5ddce4ee8391740e2da5a5f9bb06cadd
-
SSDEEP
3072:1WUvJDDILZfE0+3tONQEyPqX94MF3zqjz5/9999999999999999999999999999Y:TDDWm3QNLX9fF3uf57k
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
vjames1
C2
142.132.164.118:28463
Attributes
-
auth_value
33ac351077c983bff92335a288c764e5
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral1/memory/832-58-0x0000000000080000-0x00000000000A0000-memory.dmp family_redline behavioral1/memory/832-59-0x0000000000080000-0x00000000000A0000-memory.dmp family_redline behavioral1/memory/832-61-0x000000000041ADBA-mapping.dmp family_redline behavioral1/memory/832-63-0x0000000000080000-0x00000000000A0000-memory.dmp family_redline behavioral1/memory/832-62-0x0000000000080000-0x00000000000A0000-memory.dmp family_redline behavioral1/memory/832-67-0x0000000000080000-0x00000000000A0000-memory.dmp family_redline behavioral1/memory/832-70-0x0000000000080000-0x00000000000A0000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1200 set thread context of 832 1200 tmp.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 832 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 832 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27 PID 1200 wrote to memory of 832 1200 tmp.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832
-