Analysis
-
max time kernel
142s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2022 00:38
Static task
static1
Behavioral task
behavioral1
Sample
version_v317.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
version_v317.exe
Resource
win10v2004-20220812-en
General
-
Target
version_v317.exe
-
Size
1.2MB
-
MD5
269d8d3d39696517d5c51948a2899be3
-
SHA1
331a42d387df9b5e6156f70ad79f267d04b34b37
-
SHA256
8fcb9763b4d3082c9965fde1d5ab7897ecac32ab0e69b871a773f4c807463f91
-
SHA512
7acee556118e38d8ff242298b542ab8fb2c2b30764ee7cc313bc75c05166a3bfd6dd403a2d520ea109cf5c56f60182a764e8bf56b7b76652c125b7090fb1f300
-
SSDEEP
24576:WcLtWeOjdpB3qHYYiYNWYaQ7oMLsd/q4z+fsCPQ9MD:WcLtWJjdp1qohcs8lD
Malware Config
Extracted
redline
62.204.41.141:24758
-
auth_value
773835e0fe3917b4910de7ea8d3efab5
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/102220-133-0x0000000000370000-0x0000000000390000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
version_v317.exedescription pid Process procid_target PID 3044 set thread context of 102220 3044 version_v317.exe 85 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AppLaunch.exepid Process 102220 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid Process Token: SeDebugPrivilege 102220 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
version_v317.exedescription pid Process procid_target PID 3044 wrote to memory of 102220 3044 version_v317.exe 85 PID 3044 wrote to memory of 102220 3044 version_v317.exe 85 PID 3044 wrote to memory of 102220 3044 version_v317.exe 85 PID 3044 wrote to memory of 102220 3044 version_v317.exe 85 PID 3044 wrote to memory of 102220 3044 version_v317.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\version_v317.exe"C:\Users\Admin\AppData\Local\Temp\version_v317.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:102220
-