Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
8 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.4MB
-
MD5
1a3b88afce3a0044f0749a35ddeedbf0
-
SHA1
ba6479bffac33930aee23d60a6e0c8c33736f632
-
SHA256
368dfe8e72bf9e8f155b9f7a8bed7f4120c0a7268e8761a749550e49c055b689
-
SHA512
cf7b4749221f5881bbe9f3f6e2ac5fb7ca1b8e4bc5f6de0e72346b0553d5010e4d36d31e568ef2684e6c9017e18894ebad1d1e1e3920695863c41940c361f6ca
-
SSDEEP
49152:by0Ri/S6AJ9fcSPi/CTWOoz4q49RgOEpYMUuFjUOlDAUcLC:by0Ri/S6AJ9fcGi/Es4qKtdtuFJlDAUB
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
1310
C2
79.137.192.57:48771
Attributes
-
auth_value
feb5f5c29913f32658637e553762a40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/101732-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1180 set thread context of 101732 1180 file.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 101732 vbc.exe 101732 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 101732 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1180 wrote to memory of 101732 1180 file.exe 83 PID 1180 wrote to memory of 101732 1180 file.exe 83 PID 1180 wrote to memory of 101732 1180 file.exe 83 PID 1180 wrote to memory of 101732 1180 file.exe 83 PID 1180 wrote to memory of 101732 1180 file.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:101732
-