Analysis
-
max time kernel
58s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09/02/2023, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
424aa4b69afdf7a422f551f0cf3eddeb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
424aa4b69afdf7a422f551f0cf3eddeb.exe
Resource
win10v2004-20220812-en
General
-
Target
424aa4b69afdf7a422f551f0cf3eddeb.exe
-
Size
528KB
-
MD5
424aa4b69afdf7a422f551f0cf3eddeb
-
SHA1
0bb38c9deb06d9c03b76b303872ab6c2613c3f35
-
SHA256
40c670bb50b4f05b3f9d45b23870927b8035598e6905afc55473925dcbd9a6cb
-
SHA512
62df234e5fe22e90206868b77d98c8b473ec1ca171fe572139c3c0099ecc2fad980cf21eb9558bb690f8cf7a7ca69dd30e68c7d8249ca0a1bb69af275f0af7fd
-
SSDEEP
3072:3Y89W5Hon128oj0yjObfQ/lI/GwT2k/+Hvr8XpyZZWBG/Pa2tYpIQPqb:3Y8v128ow+oT2kmHv6CF3aU1
Malware Config
Extracted
redline
0402chqallenge
45.15.157.156:10562
-
auth_value
d77060ab8876ae21a4f5083b1325f78d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 268 set thread context of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1140 vbc.exe 1140 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1140 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28 PID 268 wrote to memory of 1140 268 424aa4b69afdf7a422f551f0cf3eddeb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\424aa4b69afdf7a422f551f0cf3eddeb.exe"C:\Users\Admin\AppData\Local\Temp\424aa4b69afdf7a422f551f0cf3eddeb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-