Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2022, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
eb36f015654cfb68e986189b29c2b875.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eb36f015654cfb68e986189b29c2b875.exe
Resource
win10v2004-20221111-en
General
-
Target
eb36f015654cfb68e986189b29c2b875.exe
-
Size
214KB
-
MD5
eb36f015654cfb68e986189b29c2b875
-
SHA1
15f6c5e951aaed2db92f94363ecbee345095dd66
-
SHA256
8ae79bd64f0f7222b4b2130855e80228efa732505718bf2f436927c6315ce8f4
-
SHA512
a0434575b1d94e421c35abfb38cc39fea4908719350e2e6249dfbfe3c2a020e609d59fc51d88cc60d25eee234581ed78a8a429fd59161a8c2c7fb678a64ea212
-
SSDEEP
6144:hCQurTr1TmEgUernVrKVgkXrSkSaFTg/r:hJS/1TmmInNOgCmraFc
Malware Config
Extracted
redline
test
185.215.113.14:4709
-
auth_value
893495d0f145810bbb3a3733603ea9fb
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 4388 1764 eb36f015654cfb68e986189b29c2b875.exe 77 -
Program crash 1 IoCs
pid pid_target Process procid_target 3496 1764 WerFault.exe 75 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4388 AppLaunch.exe 4388 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4388 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4388 1764 eb36f015654cfb68e986189b29c2b875.exe 77 PID 1764 wrote to memory of 4388 1764 eb36f015654cfb68e986189b29c2b875.exe 77 PID 1764 wrote to memory of 4388 1764 eb36f015654cfb68e986189b29c2b875.exe 77 PID 1764 wrote to memory of 4388 1764 eb36f015654cfb68e986189b29c2b875.exe 77 PID 1764 wrote to memory of 4388 1764 eb36f015654cfb68e986189b29c2b875.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb36f015654cfb68e986189b29c2b875.exe"C:\Users\Admin\AppData\Local\Temp\eb36f015654cfb68e986189b29c2b875.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 1522⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1764 -ip 17641⤵PID:4360