Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 22:11
Static task
static1
Behavioral task
behavioral1
Sample
9744d48a89a883ff6ca3a33dc419001b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9744d48a89a883ff6ca3a33dc419001b.exe
Resource
win10v2004-20230220-en
General
-
Target
9744d48a89a883ff6ca3a33dc419001b.exe
-
Size
295KB
-
MD5
9744d48a89a883ff6ca3a33dc419001b
-
SHA1
e0d406538b3fa79ac96f07ceb0ff8bd99fdc7438
-
SHA256
2ed78a7170336d23af7b56c93a0c38c7c041e135ee38f52375a61a3245eb02ce
-
SHA512
d405499ca967acb632846a8a7d4e19251b26abfc4b8f037ec40f48274d2651b72399644a394ebbecbb2b242f728fc5116b4e7b3ed28c22730c091f3a12d02740
-
SSDEEP
3072:U1L/wDkkPHR8Vhuy+tQ+ZV2BX7PhHVD0SH2VWS6cYDT6QALnxGL6L5RR26l11Uq+:o8vRvtQ8YX7Ph1D0SWVWS6cYCLnmj
Malware Config
Extracted
redline
135.181.173.163:4324
-
auth_value
a909e2aaecf96137978fea4f86400b9b
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5112 set thread context of 4276 5112 9744d48a89a883ff6ca3a33dc419001b.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 1924 5112 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4276 AppLaunch.exe 4276 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4276 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4276 5112 9744d48a89a883ff6ca3a33dc419001b.exe 87 PID 5112 wrote to memory of 4276 5112 9744d48a89a883ff6ca3a33dc419001b.exe 87 PID 5112 wrote to memory of 4276 5112 9744d48a89a883ff6ca3a33dc419001b.exe 87 PID 5112 wrote to memory of 4276 5112 9744d48a89a883ff6ca3a33dc419001b.exe 87 PID 5112 wrote to memory of 4276 5112 9744d48a89a883ff6ca3a33dc419001b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9744d48a89a883ff6ca3a33dc419001b.exe"C:\Users\Admin\AppData\Local\Temp\9744d48a89a883ff6ca3a33dc419001b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 1362⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5112 -ip 51121⤵PID:1864