Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 05:49
Static task
static1
Behavioral task
behavioral1
Sample
4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe
Resource
win10v2004-20220901-en
General
-
Target
4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe
-
Size
217KB
-
MD5
3ee2d2c044853c61e077deca7aaf46f8
-
SHA1
7c4eb1cfc50d8084bc4d4247e6d5b442f4b0dae1
-
SHA256
4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0
-
SHA512
c0a11a8029938e1813cf4dc17b8024606e69049f33d0958ef25235ee68d67cc46b7b700091a41b4573eb8b7114694576aad804e9104565154a5e7c0330ddf788
-
SSDEEP
3072:JE4v790Lox+J4ETyre2xRc0jqr76OlnA9DMpYU4KZe8JbJ3Yl6PR+cpY8jwVS:JnvZ0Loqwe2xrjq6O4MJ4bM5Y4+cE
Malware Config
Extracted
redline
@madboyza
193.106.191.138:32796
-
auth_value
9bfce7bfb110f8f53d96c7a32c655358
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4784-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exedescription pid process target process PID 1616 set thread context of 4784 1616 4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1492 1616 WerFault.exe 4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
vbc.exepid process 4784 vbc.exe 4784 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 4784 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exedescription pid process target process PID 1616 wrote to memory of 4784 1616 4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe vbc.exe PID 1616 wrote to memory of 4784 1616 4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe vbc.exe PID 1616 wrote to memory of 4784 1616 4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe vbc.exe PID 1616 wrote to memory of 4784 1616 4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe vbc.exe PID 1616 wrote to memory of 4784 1616 4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe"C:\Users\Admin\AppData\Local\Temp\4268a707cdc42b0b2543831ff435c280efbab5dc7424bb519bc9a1f3ffaca9a0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 1562⤵
- Program crash
PID:1492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1616 -ip 16161⤵PID:2972