Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20220812-en
General
-
Target
Loader.exe
-
Size
356KB
-
MD5
ca658abe53bf90a6bb559b508755c9db
-
SHA1
6a86aa44a23515551d5ff72c4e0d0874db01b016
-
SHA256
30d5f44bca5ec067c848b0b8d43d6cc0f732f15788bbdbd85019ccefda069d6e
-
SHA512
cae6a647d9011811fe6400b8f25b098ff969da15ba7c0f05e965560b49bd3cee2cef78dbbe44ff0c1431e840eb0c0d953add965b7aac01bc1b3eab98cbf60c36
-
SSDEEP
6144:jw1tP0CZ0GLsa4qYs5YKTWc2B36UAOTVxJsa524kkShdf9D9iUIJRwG1FojBKnF:jw1tsCZ0GLsa4qotJsK2cS/iUIJRwG1z
Malware Config
Extracted
redline
193.106.191.160:8673
-
auth_value
7afd93ee76af36cf30337d81ca955791
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/97760-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4720 set thread context of 97760 4720 Loader.exe 81 -
Program crash 1 IoCs
pid pid_target Process procid_target 97880 4720 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 97760 AppLaunch.exe 97760 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 97760 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4720 wrote to memory of 97760 4720 Loader.exe 81 PID 4720 wrote to memory of 97760 4720 Loader.exe 81 PID 4720 wrote to memory of 97760 4720 Loader.exe 81 PID 4720 wrote to memory of 97760 4720 Loader.exe 81 PID 4720 wrote to memory of 97760 4720 Loader.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:97760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 947722⤵
- Program crash
PID:97880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4720 -ip 47201⤵PID:97824