Analysis
-
max time kernel
347s -
max time network
408s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 09:54
Static task
static1
Behavioral task
behavioral1
Sample
c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe
Resource
win10v2004-20221111-en
General
-
Target
c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe
-
Size
277KB
-
MD5
8ccc32cd5a4010a45ebc2d6b94da56ba
-
SHA1
15692ffb626892fb0bb9f328ef1779ea45401017
-
SHA256
c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8
-
SHA512
7c202d52a178e5b3e2ad5f3b0cbec0a7c68ae8e8beeac2b33dc7684bc2d2661c80369b13ec8552c9e48a51f182dacfb8fdda29930fb6b2f685b2d5db3e6db99d
-
SSDEEP
3072:0LjOr5jAID8M/tdy98JMLOSEkb7WLa3QA/SfSnZKGC5gTWh+2xO:0LSr5jAIDHE98JEbCe3QwSAZTJ
Malware Config
Extracted
redline
@2023@
193.106.191.138:32796
-
auth_value
ca057e5baadfd0774a34a6a949cd5e69
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exedescription pid process target process PID 4984 set thread context of 3444 4984 c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2040 4984 WerFault.exe c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exedescription pid process target process PID 4984 wrote to memory of 3444 4984 c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe vbc.exe PID 4984 wrote to memory of 3444 4984 c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe vbc.exe PID 4984 wrote to memory of 3444 4984 c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe vbc.exe PID 4984 wrote to memory of 3444 4984 c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe vbc.exe PID 4984 wrote to memory of 3444 4984 c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe"C:\Users\Admin\AppData\Local\Temp\c0257738a8e9eead31925e9fac9d1bb62a57724d11dfd1d8a4a4ba3a1fc535b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 1642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4984 -ip 49841⤵