Analysis
-
max time kernel
64s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2023 10:43
Static task
static1
Behavioral task
behavioral1
Sample
5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe
Resource
win10v2004-20220812-en
General
-
Target
5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe
-
Size
3.7MB
-
MD5
c45975c51ac3505646133f98f1c62bca
-
SHA1
47380c1e4c08ea9d3a80c849e18d4af5c79753e3
-
SHA256
5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88
-
SHA512
fa8a3642cd9c0df1695947ba8016afd688f432d12075f33138a1015ed3e1767a36ae604d2b6e8f115497df0645bd70bc03f8fe22379dc9c454cba0d8440edb8e
-
SSDEEP
98304:l5V+XL/9v+YT5sUZI3VX6L9Ji5R3RsuznwhxkiC:bQb9v+m5aVy9Jixsu0xK
Malware Config
Extracted
redline
st1
librchichelpai.shop:81
rniwondunuifac.shop:81
-
auth_value
a7232a45d6034ee2454fc434093d8f12
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exedescription pid process target process PID 5100 set thread context of 3000 5100 5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3000 AppLaunch.exe 3000 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3000 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exedescription pid process target process PID 5100 wrote to memory of 3000 5100 5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe AppLaunch.exe PID 5100 wrote to memory of 3000 5100 5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe AppLaunch.exe PID 5100 wrote to memory of 3000 5100 5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe AppLaunch.exe PID 5100 wrote to memory of 3000 5100 5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe AppLaunch.exe PID 5100 wrote to memory of 3000 5100 5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe"C:\Users\Admin\AppData\Local\Temp\5331428611e6a398284611837de8d995d012abbc444f69acfdfb370ef6655f88.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000