Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
file.exe
-
Size
228KB
-
MD5
049266c4d9f54e08aa341e48fec74ee2
-
SHA1
70311d30ab733549e28cbfa3e269b49fca531733
-
SHA256
9c2cd3054daa423bf29f6af6dc35b986df456c6356849fe2b75b2fb9cdfef953
-
SHA512
387948aea8c86baca67b6076c7c69323d4bbf6f4773c19ed6829af0457db9352ac67ac37d6d1d1b00f1793bb9cc7d82795dfc0e2e6e7c605a676aa5f3ddd22a4
-
SSDEEP
6144:QolJaSz9IC7MaaaaaLgi6a7OnqJ9RfoL6kuw19:QolJVz9IoMaaaaaLD7Oq3Rf85uw19
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
PremiumCloud#41
C2
151.80.89.227:45878
Attributes
-
auth_value
6011f107082889840844bd9a1730558b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 7 IoCs
resource yara_rule behavioral1/memory/1204-59-0x00000000001C0000-0x00000000001E8000-memory.dmp family_redline behavioral1/memory/1204-60-0x00000000001C0000-0x00000000001E8000-memory.dmp family_redline behavioral1/memory/1204-62-0x000000000042214E-mapping.dmp family_redline behavioral1/memory/1204-63-0x00000000001C0000-0x00000000001E8000-memory.dmp family_redline behavioral1/memory/1204-64-0x00000000001C0000-0x00000000001E8000-memory.dmp family_redline behavioral1/memory/1204-68-0x00000000001C0000-0x00000000001E8000-memory.dmp family_redline behavioral1/memory/1204-71-0x00000000001C0000-0x00000000001E8000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 852 set thread context of 1204 852 file.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1204 vbc.exe 1204 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1204 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27 PID 852 wrote to memory of 1204 852 file.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-