Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2023 15:33
Static task
static1
Behavioral task
behavioral1
Sample
1a90749990cd53ca3fced5acfaeefb1a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a90749990cd53ca3fced5acfaeefb1a.exe
Resource
win10v2004-20221111-en
General
-
Target
1a90749990cd53ca3fced5acfaeefb1a.exe
-
Size
5.3MB
-
MD5
1a90749990cd53ca3fced5acfaeefb1a
-
SHA1
ae7c12d6de1dc97973d0c23eec9f20ba6d04ec84
-
SHA256
923ee449cd1680cb74fd41c785688e0974c6912da0ce37e7decd79b7af544d79
-
SHA512
f8c5a7e8de54add19fc69a16cb799b4adb7fa6a40787224fd51d41d9bf79250902af0d2e95e9abde9d5eee3c261ba9dfe110ea4b43848e442cfe4cd1bfddffbb
-
SSDEEP
12288:KhefaqG4yPa3Pj67yz8t2+1ZpyN2uVA4yOQ6jEu06Fy2Mxzo3:0eSqG4yPafmN9yNBqT364u06F0xM
Malware Config
Extracted
redline
03.02.23
188.127.227.25:6714
-
auth_value
2cf638fe716dc2686fde58759ab8a963
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4940 set thread context of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91 PID 4940 wrote to memory of 916 4940 1a90749990cd53ca3fced5acfaeefb1a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a90749990cd53ca3fced5acfaeefb1a.exe"C:\Users\Admin\AppData\Local\Temp\1a90749990cd53ca3fced5acfaeefb1a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\1a90749990cd53ca3fced5acfaeefb1a.exe"C:\Users\Admin\AppData\Local\Temp\1a90749990cd53ca3fced5acfaeefb1a.exe"2⤵PID:916
-