Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.4MB
-
MD5
1b8122dabd7cc5b26b638b36644959df
-
SHA1
7476421c47b7f8339dafa0061cd7c090ee0ef05f
-
SHA256
d29207615954a14c746c6f1d6c5c8ccb33997ebf7f44a296c44972ed10a7102a
-
SHA512
3b9a66e296ca7b3d54c084db41cbe6b8bf7d4031acc18d6edeaac2bff1f01c55258cd733d79e99d1f801c6b0e79a6cb52876602811239ab4f75ec7641477602a
-
SSDEEP
49152:3yTa5UKl7dQ6WFSPifCTyGBofbfrhmpSnfeJzdNbPmO95c9JY:3yTa5UKlZQ6WFGifEz4f9mpSfKd+O9uS
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
1310
C2
79.137.192.57:48771
Attributes
-
auth_value
feb5f5c29913f32658637e553762a40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/99856-56-0x00000000000C0000-0x00000000000E8000-memory.dmp family_redline behavioral1/memory/99856-61-0x00000000000E216E-mapping.dmp family_redline behavioral1/memory/99856-62-0x00000000000C0000-0x00000000000E8000-memory.dmp family_redline behavioral1/memory/99856-63-0x00000000000C0000-0x00000000000E8000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 99856 2028 file.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 99856 vbc.exe 99856 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 99856 vbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2028 wrote to memory of 99856 2028 file.exe 28 PID 2028 wrote to memory of 99856 2028 file.exe 28 PID 2028 wrote to memory of 99856 2028 file.exe 28 PID 2028 wrote to memory of 99856 2028 file.exe 28 PID 2028 wrote to memory of 99856 2028 file.exe 28 PID 2028 wrote to memory of 99856 2028 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:99856
-