Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 20:01
Static task
static1
Behavioral task
behavioral1
Sample
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe
Resource
win10v2004-20220901-en
General
-
Target
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe
-
Size
725KB
-
MD5
e17ea9a5a3a77e8448ab1d777c86ba18
-
SHA1
6c4f7b37e8b46d52f7f3dabfe3ea90aa9022c72e
-
SHA256
e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a
-
SHA512
bd4f28ec8b43722f2ed6a23236bee418b28d8713c6343dd74bd88698aff6bf6f66afadd448373b4f5007461c17bdd948d699aa31f5249e1a824d445da9b57d84
-
SSDEEP
12288:ESW8QlniHAXIFEuCbgucz1EaUEikA5EicgZLv0OROZnvtgHuVkuyUxW7rHPPM/o5:ESW8QBKAXIFEuqmcEizr0OROCr/HM
Malware Config
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/memory/3268-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/4892-138-0x0000000000600000-0x00000000006B8000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4892 set thread context of 3268 4892 e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3268 vbc.exe 3268 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3268 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3268 4892 e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe 83 PID 4892 wrote to memory of 3268 4892 e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe 83 PID 4892 wrote to memory of 3268 4892 e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe 83 PID 4892 wrote to memory of 3268 4892 e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe 83 PID 4892 wrote to memory of 3268 4892 e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe"C:\Users\Admin\AppData\Local\Temp\e6aeedc5ade86dfdaed708b1d27c1871b328993dcec30a21401a1791a494245a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268
-