Analysis
-
max time kernel
228s -
max time network
293s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
crrr.exe
Resource
win7-20220812-en
8 signatures
300 seconds
Behavioral task
behavioral2
Sample
crrr.exe
Resource
win10v2004-20220901-en
8 signatures
300 seconds
General
-
Target
crrr.exe
-
Size
272KB
-
MD5
49c58d8c10f73b17dafde9adf0b0d2f9
-
SHA1
1e4477336fec9630670104c06bb82232c0581d13
-
SHA256
2a1276d50bffabe2b41cd6c789ef1b5df02080d1ed1c87acce6bcc91f0ac29f8
-
SHA512
b2b95779d242b2703f7b3755736590ede6647c007c154c90e59e5edd916d558cb32cfe8865dd7eee4b84d84b7050ce0762c25de633fbd519ed8009c5778f3459
-
SSDEEP
6144:yH6wnQV/wfzsyrvb6PKfEXpXWucI+MW6/b:zwnQOPH2KfEXRWzeW6/b
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
Crypt_Cryptex_V1
C2
194.36.177.60:81
Attributes
-
auth_value
d8f662f9a9589a3ffdce7a16109ab9b7
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/856-135-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4032 set thread context of 856 4032 crrr.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 856 vbc.exe 856 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 856 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4032 wrote to memory of 856 4032 crrr.exe 83 PID 4032 wrote to memory of 856 4032 crrr.exe 83 PID 4032 wrote to memory of 856 4032 crrr.exe 83 PID 4032 wrote to memory of 856 4032 crrr.exe 83 PID 4032 wrote to memory of 856 4032 crrr.exe 83 PID 4032 wrote to memory of 856 4032 crrr.exe 83 PID 4032 wrote to memory of 856 4032 crrr.exe 83 PID 4032 wrote to memory of 856 4032 crrr.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\crrr.exe"C:\Users\Admin\AppData\Local\Temp\crrr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-