Analysis
-
max time kernel
96s -
max time network
178s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01/11/2022, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe
Resource
win7-20220812-en
General
-
Target
e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe
-
Size
2.4MB
-
MD5
6d08b9c640d37b92015c4089b67b60fc
-
SHA1
0ef593211a9490ad9133e270ed25167bdfabc442
-
SHA256
e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7
-
SHA512
81f363b875025a53ff9ad3f97c0f991e73c43ad9d6ae6f8bd12e901a4b24527b1d33fb58d4c85b08aa2d39aed1ef18efac5d4e8eb18a3c2be2e54fea272750fa
-
SSDEEP
24576:KQZc1Jo4kY0Yzo95v9dUMzLsc0dqWU1va3945IW6YM1ACS9hLxrHl3RuQ55313e:Nq1JoTUDyt6YMKCS9hxl34
Malware Config
Extracted
redline
ubivica
185.106.92.228:24221
-
auth_value
ce5fd9c1dbac271cad6d4c8ac467dd30
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/4008-131-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/4008-136-0x0000000000422136-mapping.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4852 build.exe -
resource yara_rule behavioral2/files/0x000800000001abf3-614.dat upx behavioral2/files/0x000800000001abf3-613.dat upx behavioral2/memory/4852-620-0x00000000003C0000-0x00000000011F9000-memory.dmp upx behavioral2/memory/4852-621-0x00000000003C0000-0x00000000011F9000-memory.dmp upx behavioral2/memory/4852-640-0x00000000003C0000-0x00000000011F9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2708 set thread context of 4008 2708 e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe 44 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4008 vbc.exe 4008 vbc.exe 4944 powershell.exe 4944 powershell.exe 4944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4008 vbc.exe Token: SeDebugPrivilege 4944 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2708 wrote to memory of 4008 2708 e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe 44 PID 2708 wrote to memory of 4008 2708 e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe 44 PID 2708 wrote to memory of 4008 2708 e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe 44 PID 2708 wrote to memory of 4008 2708 e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe 44 PID 2708 wrote to memory of 4008 2708 e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe 44 PID 4008 wrote to memory of 4852 4008 vbc.exe 68 PID 4008 wrote to memory of 4852 4008 vbc.exe 68 PID 4852 wrote to memory of 4944 4852 build.exe 70 PID 4852 wrote to memory of 4944 4852 build.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe"C:\Users\Admin\AppData\Local\Temp\e323e77e4de084cbd021f145ea6c06272cc02b3cc205661b1f1a0b394c1479a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD598a18c083befbe5c1dbde47292fc2b12
SHA16782b8a22a9596c57e4ac3adad9a39bf40ce811b
SHA25611c8d7044705de2a4f724e27223e3a10b753e8b213525fe8aca71fcb7aea95ef
SHA5125bcda777d4d3c47c7c9e21bd688f617b26703ffec73aa7af9a14489480451d33bf3eb52296bcc7c4bf5f28756661e626d9732f30e2266ec08813fc0bb1bd5e09
-
Filesize
4.3MB
MD598a18c083befbe5c1dbde47292fc2b12
SHA16782b8a22a9596c57e4ac3adad9a39bf40ce811b
SHA25611c8d7044705de2a4f724e27223e3a10b753e8b213525fe8aca71fcb7aea95ef
SHA5125bcda777d4d3c47c7c9e21bd688f617b26703ffec73aa7af9a14489480451d33bf3eb52296bcc7c4bf5f28756661e626d9732f30e2266ec08813fc0bb1bd5e09