Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2023, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
e0888920ecf5282f98cc62836905ecdd.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e0888920ecf5282f98cc62836905ecdd.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
e0888920ecf5282f98cc62836905ecdd.bin.exe
-
Size
553KB
-
MD5
e0888920ecf5282f98cc62836905ecdd
-
SHA1
3e954e4030869d99ecbaf6503acafd1ef4a81dbf
-
SHA256
f57536badf2858c34c301bc1fd7e237a1f700f3e48c6563cdf4ada287d1151f2
-
SHA512
ab8fd95c90930875b3db507c75ec5d883b1b73966129df31dc300ebe2d6ee6b7fb540d7bd46e5dedcf88ab3affa5713ae408f57081dd54e6323ee06f99b9a7ea
-
SSDEEP
12288:C2iNqgIbuMjFxhqrvhf1TP2TmQs2e9hpqW7dwY5DVjuAk1aGL:C1wgWvhQvhfdP3LqW7Tvju3aGL
Malware Config
Extracted
redline
1379752987
107.167.69.80:28253
-
auth_value
94039ae8b5b0b9ec5346501cc0139461
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4356 set thread context of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 e0888920ecf5282f98cc62836905ecdd.bin.exe 3060 e0888920ecf5282f98cc62836905ecdd.bin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3060 e0888920ecf5282f98cc62836905ecdd.bin.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91 PID 4356 wrote to memory of 3060 4356 e0888920ecf5282f98cc62836905ecdd.bin.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"C:\Users\Admin\AppData\Local\Temp\e0888920ecf5282f98cc62836905ecdd.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\e0888920ecf5282f98cc62836905ecdd.bin.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3