Analysis
-
max time kernel
91s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16/01/2023, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
b67148279cb0eccef45564104edd28528895706d8f15f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b67148279cb0eccef45564104edd28528895706d8f15f.exe
Resource
win10v2004-20220901-en
General
-
Target
b67148279cb0eccef45564104edd28528895706d8f15f.exe
-
Size
276KB
-
MD5
972f7adfdb8698188f4823ab492a57fa
-
SHA1
5c2b3d50742dddbffbb1c568104805beb9001d65
-
SHA256
b67148279cb0eccef45564104edd28528895706d8f15fc9a806387f5bcc8752f
-
SHA512
2da2e73cab249853078d7d35a24806b1c15112ad976329ca3fe7bf16c84ad6614070e7163b6a614193cb91924463a2eadd4a8f98544048b6b2229b4a4b8bed3a
-
SSDEEP
6144:ExoZEhkyxrgb6rV4Vnsc5xxNMMbVaT5hYovGINYO:vZEj06rV3cXcT5hHR
Malware Config
Extracted
redline
1
librchichelpai.shop:81
rniwondunuifac.shop:81
-
auth_value
b6c86adb7106e9ee7247628f59e06830
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3656 set thread context of 2324 3656 b67148279cb0eccef45564104edd28528895706d8f15f.exe 78 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2324 AppLaunch.exe 2324 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3656 wrote to memory of 2324 3656 b67148279cb0eccef45564104edd28528895706d8f15f.exe 78 PID 3656 wrote to memory of 2324 3656 b67148279cb0eccef45564104edd28528895706d8f15f.exe 78 PID 3656 wrote to memory of 2324 3656 b67148279cb0eccef45564104edd28528895706d8f15f.exe 78 PID 3656 wrote to memory of 2324 3656 b67148279cb0eccef45564104edd28528895706d8f15f.exe 78 PID 3656 wrote to memory of 2324 3656 b67148279cb0eccef45564104edd28528895706d8f15f.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67148279cb0eccef45564104edd28528895706d8f15f.exe"C:\Users\Admin\AppData\Local\Temp\b67148279cb0eccef45564104edd28528895706d8f15f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-