Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/01/2023, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
7 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
465KB
-
MD5
6ea8e8ef0e4ef1d07ee5bcadb8986326
-
SHA1
5b594f157bd3b7832b40ea70672a46eec055e1e2
-
SHA256
2fc103f91f638b1a26952d2080f7591546a38bb7f712d86e87c6cbcd92ddb5c4
-
SHA512
d15f6b34b3cce61604da19cbcb46242765c88e947ea0494322195d56f2f453cd4276624937fc295962558802558c4c089da76b71abcd3ef801b57299c8feb326
-
SSDEEP
6144:NId2Wt43Mtk3VG8Ik3KKwC/Z6x4JttcBDlxdwpfxfBThM9eo1I7u0Kry2wej993r:0Klc856MoofBTy9eo1dCY
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
Cryptex_33
C2
82.115.223.23:81
Attributes
-
auth_value
d19b0caa923fc609bf69b75538798f17
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 1672 2028 tmp.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1672 vbc.exe 1672 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1672 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28 PID 2028 wrote to memory of 1672 2028 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-