Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 10:02
Static task
static1
Behavioral task
behavioral1
Sample
3224cc38d32cc4e6050575fa5861225c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3224cc38d32cc4e6050575fa5861225c.exe
Resource
win10v2004-20220812-en
General
-
Target
3224cc38d32cc4e6050575fa5861225c.exe
-
Size
2.6MB
-
MD5
3224cc38d32cc4e6050575fa5861225c
-
SHA1
4837ade85cacaef392a9dcf63c743cc1df688e67
-
SHA256
388e194cf469b23bafb41c05b05a6017d55e8f9904edb6439f030b73b3d4f274
-
SHA512
289b9be782586f737846797be91a4f292b2ea32842f5748b5480d2d00455b7ea343e2a98547638e925de7bc384b2e072027df4ccbcfb027a155d58def29db262
-
SSDEEP
24576:8KSmyPfZE/Wj2wI8mbYVYe5qclDJMJmBdapR+C8IDENZSXK6LTbL3dl3RuQ5531I:BSzPhEujZI8ri3T8IoNYXK6LTbDdl3q
Malware Config
Extracted
redline
0510
45.95.233.29:33062
-
auth_value
1928b93ebb9b3105c2219dbf80e66e7c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/98700-56-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/98700-61-0x0000000000422172-mapping.dmp family_redline behavioral1/memory/98700-63-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/98700-62-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1384 set thread context of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 98700 AppLaunch.exe 98700 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 98700 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29 PID 1384 wrote to memory of 98700 1384 3224cc38d32cc4e6050575fa5861225c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3224cc38d32cc4e6050575fa5861225c.exe"C:\Users\Admin\AppData\Local\Temp\3224cc38d32cc4e6050575fa5861225c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:98700
-