Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe
Resource
win10v2004-20220901-en
General
-
Target
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe
-
Size
239KB
-
MD5
5f66f6f04fab186a8bd08162c1e67337
-
SHA1
30fbbedab38ce51ac8009cf337794fd53552d726
-
SHA256
2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25
-
SHA512
9bb1b7f180f449fac9cdf53b94f51eb5aaaf7881b5eac3c0010d0acbeb23c82016f580764bd16643507ba5ff7d6dbd0dcc42aee3d321dafe610a9f797a5ddacf
-
SSDEEP
3072:zx+Ygbyg6H8xK/q+PwjUoHp0DCe8K/1IzKbVR4TfGRrhqZIATcYmbxO:zx+YgWg5Kq+PwQoHp0DoK2KJSTfqrhm3
Malware Config
Extracted
redline
@P1
193.106.191.138:32796
-
auth_value
54c79ce081122137049ee07c0a2f38ab
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
resource yara_rule behavioral1/memory/1996-57-0x0000000000080000-0x00000000000A8000-memory.dmp family_redline behavioral1/memory/1996-62-0x00000000000A21CA-mapping.dmp family_redline behavioral1/memory/1996-63-0x0000000000080000-0x00000000000A8000-memory.dmp family_redline behavioral1/memory/1996-64-0x0000000000080000-0x00000000000A8000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1476 set thread context of 1996 1476 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 28 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1996 vbc.exe 1996 vbc.exe 1996 vbc.exe 1996 vbc.exe 1996 vbc.exe 1996 vbc.exe 1996 vbc.exe 1996 vbc.exe 1996 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 vbc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1996 1476 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 28 PID 1476 wrote to memory of 1996 1476 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 28 PID 1476 wrote to memory of 1996 1476 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 28 PID 1476 wrote to memory of 1996 1476 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 28 PID 1476 wrote to memory of 1996 1476 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 28 PID 1476 wrote to memory of 1996 1476 2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe"C:\Users\Admin\AppData\Local\Temp\2a9237e01f7f8a281246db14183f903b27b6f4a2760cef9cfc51e7876bbb4c25.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-