Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230221-en
4 signatures
150 seconds
General
-
Target
sample.exe
-
Size
3.9MB
-
MD5
52430366ded3db6cc20919d2ca3f315c
-
SHA1
fea75632f000afcb45d25a7f4c623ccaa72d17db
-
SHA256
1f8cd2662ec9b5e249c79a0bf4b03e6f584794a9ac087be7f8b257f7f813bb84
-
SHA512
4fd8cfd21d5a4954e8fbc67d2aa4d08d532485a35d1a924a2f084da60de829cc3f32cd7726c8cf2ea8e3cf716c8c18336cf5286508b93a6da2037c5f63c29597
-
SSDEEP
98304:ezXXqjn5ie+xlo0+at12K39nFzBoJL7KGue3zN484Mwo6jy5R0oHU93Gz+:ezXXqjncxlo0+S1FzBoZ2Ve3J45xm5RO
Score
10/10
Malware Config
Extracted
Family
redline
C2
185.200.191.18:80
Attributes
-
auth_value
470ee96cae88bc7ec6439074338e8e8b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4592-147-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 452 set thread context of 4592 452 sample.exe 87 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 452 wrote to memory of 4592 452 sample.exe 87 PID 452 wrote to memory of 4592 452 sample.exe 87 PID 452 wrote to memory of 4592 452 sample.exe 87 PID 452 wrote to memory of 4592 452 sample.exe 87 PID 452 wrote to memory of 4592 452 sample.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4592
-