Analysis
-
max time kernel
98s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2023, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20230220-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20230220-en
7 signatures
150 seconds
General
-
Target
build.exe
-
Size
746.5MB
-
MD5
8328cb63b33363844539847a1bb33455
-
SHA1
911db14e14b45a7fc0db7111c1e18b4a08f4ba58
-
SHA256
c84ac5d003d64abfba712b97ea1e9d5668a457280de8ba05fb17999986ca8fdc
-
SHA512
a8582f081c69471f569ef8822145b6fcf35e8471820c080972eb05e3de02c37a36c9376ee89ebefd47be29398fe9de549fc2e9d8cec391af2720968647237c7b
-
SSDEEP
49152:MOZM2g29VOD1yQpHfzivSp5vrMtyqvFhbqo4uHBlBcl:NLa1JpzivevrMty8bqozB
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
25.03
C2
37.220.87.78:25387
Attributes
-
auth_value
5cfc89aee6c1fd926c66b4cb6c07caa2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3992 set thread context of 1680 3992 build.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1680 vbc.exe 1680 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93 PID 3992 wrote to memory of 1680 3992 build.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-