Analysis
-
max time kernel
116s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 09:21
Static task
static1
Behavioral task
behavioral1
Sample
Video.mp4.scr
Resource
win7-20220812-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Video.mp4.scr
Resource
win10v2004-20220812-en
7 signatures
150 seconds
General
-
Target
Video.mp4.scr
-
Size
700.0MB
-
MD5
6de44c2adad475a723f04039fd238a17
-
SHA1
dcedfbcc71687d5a37d02b7c3a727bf47ce58f61
-
SHA256
4f4285f36464d6453221814fc6155dc41d051d25a8ab0317f13c331bc6328a30
-
SHA512
0f2cb8df757f7b29a08e8fdbabc4207a3452e777dec89141b42923a945a7d06bc174aacd45edaa1d92ea3355d3b79002737678b993c6534715aee5455f57a8fb
-
SSDEEP
49152:YTHrqPAAxChxLpsvtQ2fyyL/JHoyX3ilLZ7CU7:YTHrq0V+tEyxVsZr
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
video
C2
62.204.41.139:25190
Attributes
-
auth_value
7044b7ad49e81d903b44f3be4dfbb7b6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
resource yara_rule behavioral1/memory/1596-63-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1596-64-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1596-65-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1596-66-0x0000000000422246-mapping.dmp family_redline behavioral1/memory/1596-68-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/1596-70-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1368 set thread context of 1596 1368 Video.mp4.scr 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1596 MSBuild.exe 1596 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1596 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28 PID 1368 wrote to memory of 1596 1368 Video.mp4.scr 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Video.mp4.scr"C:\Users\Admin\AppData\Local\Temp\Video.mp4.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-