Analysis
-
max time kernel
121s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2023 08:21
Static task
static1
Behavioral task
behavioral1
Sample
a137c8887a7fbcc4eb96fc511c4ac36f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a137c8887a7fbcc4eb96fc511c4ac36f.exe
Resource
win10v2004-20221111-en
General
-
Target
a137c8887a7fbcc4eb96fc511c4ac36f.exe
-
Size
896KB
-
MD5
a137c8887a7fbcc4eb96fc511c4ac36f
-
SHA1
85d7ff6e4867a8f0df1589853b51ca303dbcc2f4
-
SHA256
bbbb1f90ed2f62c10cd7c3d7b0c464b26462c2457ad9f80ccbd2a2d019e6c2df
-
SHA512
4a716ea7aef11633c6eadc5db76cf53c6def53e0d91b7d406a63e6f8a3c04f76a9c5271c7ac52a4e58e8eb838e36330daea0ec187e871791aa69328a6c103f4c
-
SSDEEP
12288:EN0rf7bnF+RK9FmkoDCOvPTHWUImjhIKHALY/mMQ/sCEbN:1PwCOvaUImj//xmMB
Malware Config
Extracted
redline
cheat
blackrdp.mentality.cloud:45169
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1936-136-0x0000000000500000-0x000000000051E000-memory.dmp family_redline -
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4108 set thread context of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 RegSvcs.exe 1936 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe Token: SeDebugPrivilege 1936 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81 PID 4108 wrote to memory of 1936 4108 a137c8887a7fbcc4eb96fc511c4ac36f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\a137c8887a7fbcc4eb96fc511c4ac36f.exe"C:\Users\Admin\AppData\Local\Temp\a137c8887a7fbcc4eb96fc511c4ac36f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-