Analysis

  • max time kernel
    140s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/04/2023, 08:56

General

  • Target

    a117f881db023599d61cdb4b5ec34701.exe

  • Size

    5.5MB

  • MD5

    a117f881db023599d61cdb4b5ec34701

  • SHA1

    c85908997a4ffa4a9e4dfd24ccdc8702e06c7fac

  • SHA256

    7f1977f060d63fded5ad0c88615804b6e412a9f149348683eed55a794e7f1fff

  • SHA512

    a16ca9037e4524e64dc519487676bc0fc6eb5b6f509abb86ae6dc9bb5d4d5f79e9f07c5b590d9caad7ee9b8662aa84088d5b279a4771fbac312087aef088b5ac

  • SSDEEP

    98304:PB6RWAr201s+0w+0CP2M/VNWwLHIo7c7BZmNlO5Hut:PB6RWS/PNa9NWwLoFZp5H

Malware Config

Extracted

Family

redline

Botnet

April

C2

65.21.66.229:43749

Attributes
  • auth_value

    bc45d1babb14328517bab03ae5ffab51

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a117f881db023599d61cdb4b5ec34701.exe
    "C:\Users\Admin\AppData\Local\Temp\a117f881db023599d61cdb4b5ec34701.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1672
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 36
      2⤵
      • Program crash
      PID:1996

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1672-54-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1672-55-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1672-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1672-61-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1672-62-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1672-63-0x00000000003C0000-0x00000000003C6000-memory.dmp

          Filesize

          24KB

        • memory/1672-66-0x00000000048D0000-0x0000000004910000-memory.dmp

          Filesize

          256KB

        • memory/1728-64-0x0000000000400000-0x0000000001D4E000-memory.dmp

          Filesize

          25.3MB

        • memory/1728-65-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

          Filesize

          3.8MB