Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/04/2023, 17:38
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230221-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
365KB
-
MD5
fa8d66982b6d541caaf4c63fa0e815d1
-
SHA1
391da51f38ef069aba4bac550490d960a8ddea31
-
SHA256
7ca102e1ba7b7e6f886024178299d61461e4c4ed323b487be362926f9b1d4283
-
SHA512
7409bd5d6db52b5262f8bcd989c56dc2947b20168933096d795f2692f6b4fa114b230700f7d293790d2f265275cd9851b7edbd056943fc34c2c38578618338ef
-
SSDEEP
3072:dSMXOJ0xS0NvBAIfAg0Fu7LyiSCueybc/tzAcmUjQMmQSOe0pj2R9RsK2tltM4IY:dSMXOJ8DAIfAOmbcOyBKFMlqd
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
lux2
C2
176.123.9.142:14845
Attributes
-
auth_value
a190ebf01162a5f4150c75b51cfe6687
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1368 set thread context of 1968 1368 file.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1968 AppLaunch.exe 1968 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1968 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28 PID 1368 wrote to memory of 1968 1368 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-