Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-01-2023 14:04
Static task
static1
Behavioral task
behavioral1
Sample
bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe
Resource
win10-20220812-en
General
-
Target
bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe
-
Size
3.7MB
-
MD5
a45e6fa02ca2dbeeb23d6fff96436a97
-
SHA1
61ffee4cb8d28ca05b20076a5ba92aff99449ba7
-
SHA256
bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098
-
SHA512
aface0a7bd84fb503358087b27d891b6bac48f7d56c4e94dbd4cd4ad350ac3891e0180fb2a4cf76a516d753c9e5c12daea3b038c517cbf8268b7887a003f0707
-
SSDEEP
98304:sBuzuXKMr2WYU68OdYIebQ4kUny6yuuhk6R1J3bj+:h63TO8K6ypk6fRby
Malware Config
Extracted
redline
st1
librchichelpai.shop:81
rniwondunuifac.shop:81
-
auth_value
a7232a45d6034ee2454fc434093d8f12
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exedescription pid process target process PID 2100 set thread context of 3000 2100 bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exedescription pid process target process PID 2100 wrote to memory of 3000 2100 bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe AppLaunch.exe PID 2100 wrote to memory of 3000 2100 bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe AppLaunch.exe PID 2100 wrote to memory of 3000 2100 bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe AppLaunch.exe PID 2100 wrote to memory of 3000 2100 bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe AppLaunch.exe PID 2100 wrote to memory of 3000 2100 bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe"C:\Users\Admin\AppData\Local\Temp\bea9789e908b6a46592f963e652a858dde0a109de997819affc4b77cbc336098.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3000