Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-10-2022 20:49
Static task
static1
Behavioral task
behavioral1
Sample
4840c08f8c186e48e6da922f749c8fd3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4840c08f8c186e48e6da922f749c8fd3.exe
Resource
win10v2004-20220812-en
General
-
Target
4840c08f8c186e48e6da922f749c8fd3.exe
-
Size
2.6MB
-
MD5
4840c08f8c186e48e6da922f749c8fd3
-
SHA1
28ec4002535b462166a693fbe518f0713283441a
-
SHA256
db42286edc586554953f04d7faf7912b73f666f55726a17ae74b363f7ea27149
-
SHA512
ce5447e83785234c1aa68d652898c611b1c5d15b58875a4506cfa6e9ed92561c68ae1cdfff5e64abf9ed3bcfca0751b7b8eca950c2e7a1701827a1ad45b0265f
-
SSDEEP
24576:tqj3iDmTT6LHgJY+YHmu8Uz4MXmBdGGqKlIgtrHgzwzYsOLHgs7d/Fisl3RuQ55x:YiDQuH2W/g5Hg8zYsOJPl39
Malware Config
Extracted
redline
@cool_man717
79.137.195.87:41315
-
auth_value
d2ec1c50eaab1c677b88f377ee3162f2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/99516-56-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/99516-61-0x000000000042213E-mapping.dmp family_redline behavioral1/memory/99516-62-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/99516-63-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1000 set thread context of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 99516 AppLaunch.exe 99516 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 99516 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28 PID 1000 wrote to memory of 99516 1000 4840c08f8c186e48e6da922f749c8fd3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4840c08f8c186e48e6da922f749c8fd3.exe"C:\Users\Admin\AppData\Local\Temp\4840c08f8c186e48e6da922f749c8fd3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:99516
-