Analysis
-
max time kernel
50s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
29/10/2022, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe
Resource
win10-20220901-en
General
-
Target
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe
-
Size
2.3MB
-
MD5
40e711d3488dcc665a790ed0e59ad118
-
SHA1
9724a6fa4737ffb1696d83d35fd1cd0b3282464d
-
SHA256
e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778
-
SHA512
759ebe33918d9721cbdeabe14d04014e676a2de029f068164ac178d7042974a1c660a2ad6c32e91f2f09d2821854201cafd14780996b6edbfaacf5e2c43fc5fd
-
SSDEEP
49152:xy0Ri/S6AJ9fcSPiVCTcQoY0uLTDkoanJFWm85ciCxWO5Om:xy0Ri/S6AJ9fcGiVEBBLTQnjpSCkir
Malware Config
Extracted
redline
1310
79.137.192.57:48771
-
auth_value
feb5f5c29913f32658637e553762a40e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/101636-128-0x00000000045D0000-0x00000000045F8000-memory.dmp family_redline behavioral1/memory/101636-133-0x00000000045F216E-mapping.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4544 set thread context of 101636 4544 e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe 67 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 101636 vbc.exe 101636 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 101636 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4544 wrote to memory of 101636 4544 e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe 67 PID 4544 wrote to memory of 101636 4544 e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe 67 PID 4544 wrote to memory of 101636 4544 e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe 67 PID 4544 wrote to memory of 101636 4544 e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe 67 PID 4544 wrote to memory of 101636 4544 e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe"C:\Users\Admin\AppData\Local\Temp\e2dfb674a1b3483d7b61d968508383c2eea182e12181256053cf1d6929fbd778.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:101636
-