Analysis
-
max time kernel
186s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 15:56
Static task
static1
Behavioral task
behavioral1
Sample
63c02bf79ba67e69dfb5b5f115986f8b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
63c02bf79ba67e69dfb5b5f115986f8b.exe
Resource
win10v2004-20221111-en
General
-
Target
63c02bf79ba67e69dfb5b5f115986f8b.exe
-
Size
242KB
-
MD5
63c02bf79ba67e69dfb5b5f115986f8b
-
SHA1
0282d75ca0ef8167e1798ab5925bdddf604753c9
-
SHA256
84806d7ed59a57fce9b4bb07519d78f25edd45c5e56c5739a252f4b4b3c701e2
-
SHA512
0b2923317ef6cd3b034f61a22ad47ea95a4bf4de6c5f11a04a22a638f6c6de7c5d80dd844f6608de40a746c40f7a3e468d8daba26f7f81807e8c6b0b3844ebea
-
SSDEEP
6144:71gE5wi2UCeNWGa+nMzVWMNQErpV2IviDnye3sEuYq7Z:pgEaACe1a+nMzVWMNQErpV2IvQypEuYa
Malware Config
Extracted
redline
37.220.87.2:27924
-
auth_value
e457de0f8e67971846447e9d0f415966
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4888-133-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
63c02bf79ba67e69dfb5b5f115986f8b.exedescription pid process target process PID 4708 set thread context of 4888 4708 63c02bf79ba67e69dfb5b5f115986f8b.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3172 4708 WerFault.exe 63c02bf79ba67e69dfb5b5f115986f8b.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
63c02bf79ba67e69dfb5b5f115986f8b.exedescription pid process target process PID 4708 wrote to memory of 4888 4708 63c02bf79ba67e69dfb5b5f115986f8b.exe vbc.exe PID 4708 wrote to memory of 4888 4708 63c02bf79ba67e69dfb5b5f115986f8b.exe vbc.exe PID 4708 wrote to memory of 4888 4708 63c02bf79ba67e69dfb5b5f115986f8b.exe vbc.exe PID 4708 wrote to memory of 4888 4708 63c02bf79ba67e69dfb5b5f115986f8b.exe vbc.exe PID 4708 wrote to memory of 4888 4708 63c02bf79ba67e69dfb5b5f115986f8b.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c02bf79ba67e69dfb5b5f115986f8b.exe"C:\Users\Admin\AppData\Local\Temp\63c02bf79ba67e69dfb5b5f115986f8b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 2642⤵
- Program crash
PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4708 -ip 47081⤵PID:3732