Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19/04/2023, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
4493hvqJuniILmZeHYaqmrTWsgHd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4493hvqJuniILmZeHYaqmrTWsgHd.exe
Resource
win10v2004-20230221-en
General
-
Target
4493hvqJuniILmZeHYaqmrTWsgHd.exe
-
Size
14.4MB
-
MD5
6b0cd578e48d14ee52881cd8848c1d6f
-
SHA1
2c181b10930567a7ec806a2b3289b58bba705547
-
SHA256
3377ef220da5410f08f344b05e0478492960a238e51055495f0112f3207f2ab5
-
SHA512
7cc7a6a1980d9a189807cd1e3556516d91f28ca88156caeb2247fe87ce36821823730638dfb59df1c018417af0ea26b91cb6d9fbe4714320e5d6770a697721fb
-
SSDEEP
196608:Ql4lapsb2FYXSRUTuNAPqZcrG1IniBEj+9wf6JM7I:
Malware Config
Extracted
redline
TestJPG01
77.73.134.70:33110
-
auth_value
c4a14a459f67a23ecce5de88122c2b28
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 912 set thread context of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28 PID 912 wrote to memory of 932 912 4493hvqJuniILmZeHYaqmrTWsgHd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4493hvqJuniILmZeHYaqmrTWsgHd.exe"C:\Users\Admin\AppData\Local\Temp\4493hvqJuniILmZeHYaqmrTWsgHd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\4493hvqJuniILmZeHYaqmrTWsgHd.exe"C:\Users\Admin\AppData\Local\Temp\4493hvqJuniILmZeHYaqmrTWsgHd.exe"2⤵PID:932
-