Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2023 19:20

General

  • Target

    en_xachinaproject_fun.exe

  • Size

    664KB

  • MD5

    5ec3baca6ccb162f3e983ee498489c2a

  • SHA1

    48ba9ea9f155dd251eee419967f0e884be9aa3a1

  • SHA256

    d5e2e0e79a64e6fd5d96fa7b9cf2d27cc2d07f68bfd09a64824c2d6b208c22f6

  • SHA512

    da52f162e24de727fea6efc76c5416192c78e215e2e33f8c1de7dbbcbb96b2007b4bf3a20d17d7624fb31ac18850dcf88e7b2f0d072ed8ce0af6576d51df416e

  • SSDEEP

    12288:9+Pa0OH9rWyBw+2KSqU17NuNsfX6MZDGa6:9+Pa069rWyBw+jcuNsyTa

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    a46ed4068147e6d633a02a418bc30857

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\en_xachinaproject_fun.exe
    "C:\Users\Admin\AppData\Local\Temp\en_xachinaproject_fun.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:316

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-54-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/316-56-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/316-61-0x000000000041BCFE-mapping.dmp

  • memory/316-62-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/316-63-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/316-64-0x0000000075891000-0x0000000075893000-memory.dmp

    Filesize

    8KB