Analysis
-
max time kernel
58s -
max time network
76s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
06/09/2022, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe
Resource
win10-20220812-en
General
-
Target
46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe
-
Size
436KB
-
MD5
b06cd5d6f70249f3b29e700ae9f673f7
-
SHA1
21187061c165f59d826552271f45baa78b516dbd
-
SHA256
46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851
-
SHA512
79826d610016561b0b8e0fe0d174394b80b464a65af8d79f41ac3d5ebecd9dcfa4829e5dac06a76dfa3916d843a26fb44683c95ec7dbe4e59825a530b7a4174a
-
SSDEEP
12288:1XhYvjUZn4ZFjF+19978H5lWtuEkNdLuUGQlWALBXEI:dSFjF+1L8HvWkNtGMuI
Malware Config
Extracted
redline
nam5
103.89.90.61:34589
-
auth_value
f23be8e9063fe5d0c6fc3ee8e7d565bd
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/4736-129-0x00000000001E0000-0x0000000000200000-memory.dmp family_redline behavioral1/memory/4736-134-0x00000000001FADC2-mapping.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 4736 2700 46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe 67 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4736 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4736 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4736 2700 46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe 67 PID 2700 wrote to memory of 4736 2700 46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe 67 PID 2700 wrote to memory of 4736 2700 46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe 67 PID 2700 wrote to memory of 4736 2700 46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe 67 PID 2700 wrote to memory of 4736 2700 46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe"C:\Users\Admin\AppData\Local\Temp\46defec46679dd3b4854deff05ced12a53059645f312a88cd5937cd571e04851.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-