Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 22:56
Static task
static1
Behavioral task
behavioral1
Sample
FortHack.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
FortHack.exe
Resource
win10v2004-20230221-en
General
-
Target
FortHack.exe
-
Size
2.5MB
-
MD5
c4d460b4f7da75c7db76347d8de50093
-
SHA1
d9e250bee98b5d46e6929c6df3c129aa94ca2a40
-
SHA256
2da73bff9624b981e8bedce6cb13d4593eaf758f70bd2ece15dde5ffc6fda065
-
SHA512
9fc9fe17ffb5631fd01328bfe9f02f897808cda30969616d279346b2b69c3982858bd36657c5c2b725c934e1350118ca55026c91937e8ee7b540482ca1992333
-
SSDEEP
24576:2AaodXP6bRPbWYhYOxlwvBVMT+dLEEuoi/GPCOPv1cmd5LZRiI1l3RuQ55313A:28dfiRPe9ShOH1cmd5aI1l3i
Malware Config
Extracted
redline
@quppie2000
193.233.193.15:27469
-
auth_value
a2207993338b21fa7a2f1e35520a5d07
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/memory/188080-133-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral2/memory/2240-138-0x0000000000400000-0x0000000000573000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 188080 2240 FortHack.exe 83 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2240 wrote to memory of 188080 2240 FortHack.exe 83 PID 2240 wrote to memory of 188080 2240 FortHack.exe 83 PID 2240 wrote to memory of 188080 2240 FortHack.exe 83 PID 2240 wrote to memory of 188080 2240 FortHack.exe 83 PID 2240 wrote to memory of 188080 2240 FortHack.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\FortHack.exe"C:\Users\Admin\AppData\Local\Temp\FortHack.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:188080
-