Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
09/10/2022, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
068514f5a92707c86c3494f9868f898c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
068514f5a92707c86c3494f9868f898c.exe
Resource
win10v2004-20220812-en
General
-
Target
068514f5a92707c86c3494f9868f898c.exe
-
Size
2.5MB
-
MD5
068514f5a92707c86c3494f9868f898c
-
SHA1
946971adbbea34eb91f91e1d593bb97b2d63fa11
-
SHA256
7355dd57286957e0aac341c5b8483dd2dc7fb6d6e8f1704e9386efe30ede751c
-
SHA512
2bbe00afcc47a8d40c1ca87383c3fb4f9159861e75fa9e04dad12d953dd3d8a0a5c5a43aa6c8582af4ce3eeef4ab79976e30233e597cbd0acb40a558a1f98b32
-
SSDEEP
24576:KBIgYBHadgaFPaDYVYp41jlDSM5ldgalC8j+2CxGI6L/nLz1l3RuQ55313X:gInB6dgaFP40xq/xt6L/n31l3N
Malware Config
Extracted
redline
5744794367_99
zaraat.xyz:37397
-
auth_value
3a48ab7a0fb74109c7045f72b67b61e0
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/86916-56-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/86916-61-0x000000000041B4DE-mapping.dmp family_redline behavioral1/memory/86916-62-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/86916-63-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2032 set thread context of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 86916 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 86916 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28 PID 2032 wrote to memory of 86916 2032 068514f5a92707c86c3494f9868f898c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\068514f5a92707c86c3494f9868f898c.exe"C:\Users\Admin\AppData\Local\Temp\068514f5a92707c86c3494f9868f898c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:86916
-