Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/11/2022, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe
Resource
win10-20220812-en
General
-
Target
ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe
-
Size
2.3MB
-
MD5
f92516ddd9f836f3dec47a03128b388b
-
SHA1
0a80b32cf3cf5b632eac3f4ba99643ef017265ce
-
SHA256
ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773
-
SHA512
ccce0efe678a8978cb1f5796b2580506c173b40988dfe5922c0252ffe5f3d2eff30e24ec8fadab066c110653c4070aecb670a3e5c31b0057c3476f62e4d8ff0e
-
SSDEEP
24576:NsCzxS/YcYA2a5vtuMlzAhjdyw9TIAljIbPuICS2CLWeal3RuQ55313H:Gexsuz1IbPuICS2Cul3h
Malware Config
Extracted
redline
5521731897_99
botmastr.xyz:28786
-
auth_value
f6c169748e5b4501a21279a990897f61
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1604 set thread context of 1436 1604 ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 vbc.exe 1436 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1436 vbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1604 wrote to memory of 1436 1604 ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe 27 PID 1604 wrote to memory of 1436 1604 ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe 27 PID 1604 wrote to memory of 1436 1604 ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe 27 PID 1604 wrote to memory of 1436 1604 ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe 27 PID 1604 wrote to memory of 1436 1604 ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe 27 PID 1604 wrote to memory of 1436 1604 ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe"C:\Users\Admin\AppData\Local\Temp\ebc6bd0813255ef20045c4744c3aa096a1221b865abb0dd71f1e8b9d60d42773.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-