Analysis
-
max time kernel
29s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/03/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
bdcab1bf5a4cf8188032c74451814fb5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bdcab1bf5a4cf8188032c74451814fb5.exe
Resource
win10v2004-20230221-en
General
-
Target
bdcab1bf5a4cf8188032c74451814fb5.exe
-
Size
338KB
-
MD5
bdcab1bf5a4cf8188032c74451814fb5
-
SHA1
032c229f562b28c60959bc3330188eb8b9f48704
-
SHA256
826c0ad3560a00bb95697992f9be32d689a6b64fa1f8c15624f4609690b641af
-
SHA512
1b97dd52fe7b6c98eed777ffb86f53dd05b879dec35b1662213d6a163a64a5815c37120443b0e50b19b62729670ebb2f666c61ae25edd1e819ef3cbab94152ce
-
SSDEEP
6144:PAEkhcG/ZiMf1KIY+am1ioj02HY7HqpxTacZL7:YrhBA+H1ilT7Hexmcd7
Malware Config
Extracted
redline
654
185.65.105.60:10805
-
auth_value
762122531dcf2a6fba95431c415e85cb
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 -
Program crash 1 IoCs
pid pid_target Process procid_target 1208 2000 WerFault.exe 25 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1996 AppLaunch.exe 1996 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1996 AppLaunch.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1996 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 27 PID 2000 wrote to memory of 1208 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 28 PID 2000 wrote to memory of 1208 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 28 PID 2000 wrote to memory of 1208 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 28 PID 2000 wrote to memory of 1208 2000 bdcab1bf5a4cf8188032c74451814fb5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdcab1bf5a4cf8188032c74451814fb5.exe"C:\Users\Admin\AppData\Local\Temp\bdcab1bf5a4cf8188032c74451814fb5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 1322⤵
- Program crash
PID:1208
-