Analysis

  • max time kernel
    55s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 00:18

General

  • Target

    26204ca6dd796db6798008b9fb76c2f952cb377bd16cce8ed3f213f3e8c8ed83.exe

  • Size

    257KB

  • MD5

    7b1e4d6de30222deb80b3c3a6973f46e

  • SHA1

    4d1618da48e9ebe108914c1907a723896236f9f7

  • SHA256

    26204ca6dd796db6798008b9fb76c2f952cb377bd16cce8ed3f213f3e8c8ed83

  • SHA512

    195a4723eaf5b58579e9a9d06bf662b89406ddaacf1e3a77896c1fb3862ec34d600772df8993ad1df90255bd1259c17bdf1b58b4dd39bf9cc658f8f07abf8864

  • SSDEEP

    6144:/UTIt3vbSenezxXnyYfqadgbxJetFZX6kx/bl:/UTIt3vbSnyYfqaOFmFZqijl

Malware Config

Extracted

Family

redline

Botnet

Google2

C2

167.235.71.14:20469

Attributes
  • auth_value

    fb274d9691235ba015830da570a13578

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26204ca6dd796db6798008b9fb76c2f952cb377bd16cce8ed3f213f3e8c8ed83.exe
    "C:\Users\Admin\AppData\Local\Temp\26204ca6dd796db6798008b9fb76c2f952cb377bd16cce8ed3f213f3e8c8ed83.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4568
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 276
      2⤵
      • Program crash
      PID:4820
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4568 -ip 4568
    1⤵
      PID:4224

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4568-138-0x0000000000620000-0x0000000000665000-memory.dmp

            Filesize

            276KB

          • memory/4940-133-0x0000000000400000-0x0000000000428000-memory.dmp

            Filesize

            160KB

          • memory/4940-139-0x0000000006180000-0x0000000006798000-memory.dmp

            Filesize

            6.1MB

          • memory/4940-140-0x0000000007B40000-0x0000000007C4A000-memory.dmp

            Filesize

            1.0MB

          • memory/4940-141-0x0000000007A50000-0x0000000007A62000-memory.dmp

            Filesize

            72KB

          • memory/4940-142-0x0000000007AB0000-0x0000000007AEC000-memory.dmp

            Filesize

            240KB

          • memory/4940-143-0x00000000086D0000-0x0000000008762000-memory.dmp

            Filesize

            584KB

          • memory/4940-144-0x0000000008D20000-0x00000000092C4000-memory.dmp

            Filesize

            5.6MB

          • memory/4940-145-0x0000000008630000-0x0000000008696000-memory.dmp

            Filesize

            408KB

          • memory/4940-146-0x0000000008940000-0x0000000008B02000-memory.dmp

            Filesize

            1.8MB

          • memory/4940-147-0x0000000009800000-0x0000000009D2C000-memory.dmp

            Filesize

            5.2MB