Analysis
-
max time kernel
61s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
bdcab1bf5a4cf8188032c74451814fb5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bdcab1bf5a4cf8188032c74451814fb5.exe
Resource
win10v2004-20230220-en
General
-
Target
bdcab1bf5a4cf8188032c74451814fb5.exe
-
Size
338KB
-
MD5
bdcab1bf5a4cf8188032c74451814fb5
-
SHA1
032c229f562b28c60959bc3330188eb8b9f48704
-
SHA256
826c0ad3560a00bb95697992f9be32d689a6b64fa1f8c15624f4609690b641af
-
SHA512
1b97dd52fe7b6c98eed777ffb86f53dd05b879dec35b1662213d6a163a64a5815c37120443b0e50b19b62729670ebb2f666c61ae25edd1e819ef3cbab94152ce
-
SSDEEP
6144:PAEkhcG/ZiMf1KIY+am1ioj02HY7HqpxTacZL7:YrhBA+H1ilT7Hexmcd7
Malware Config
Extracted
redline
654
185.65.105.60:10805
-
auth_value
762122531dcf2a6fba95431c415e85cb
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5076 set thread context of 2708 5076 bdcab1bf5a4cf8188032c74451814fb5.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2176 5076 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 AppLaunch.exe 2708 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2708 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5076 wrote to memory of 2708 5076 bdcab1bf5a4cf8188032c74451814fb5.exe 84 PID 5076 wrote to memory of 2708 5076 bdcab1bf5a4cf8188032c74451814fb5.exe 84 PID 5076 wrote to memory of 2708 5076 bdcab1bf5a4cf8188032c74451814fb5.exe 84 PID 5076 wrote to memory of 2708 5076 bdcab1bf5a4cf8188032c74451814fb5.exe 84 PID 5076 wrote to memory of 2708 5076 bdcab1bf5a4cf8188032c74451814fb5.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdcab1bf5a4cf8188032c74451814fb5.exe"C:\Users\Admin\AppData\Local\Temp\bdcab1bf5a4cf8188032c74451814fb5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 4162⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5076 -ip 50761⤵PID:2040