Analysis
-
max time kernel
33s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 18:27
Behavioral task
behavioral1
Sample
mMail Access Checker By Blackbeard/Activator.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
mMail Access Checker By Blackbeard/Activator.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
out.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
mMail Access Checker By Blackbeard/Mail Access Checker By Blackbeard.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
mMail Access Checker By Blackbeard/Mail Access Checker By Blackbeard.exe
Resource
win10v2004-20230220-en
General
-
Target
mMail Access Checker By Blackbeard/Mail Access Checker By Blackbeard.exe
-
Size
67.9MB
-
MD5
9132ad66ee47bec708139c39d6b7f20d
-
SHA1
34a11b80ef1ce3b6ba58c598feb0eab46b4e9e15
-
SHA256
1abf5f1e19d5bafea7a079475731e50aa01ccbb0b69dbf32d042e2837a3e5846
-
SHA512
1e2143196d6b53d10702d471769206f61e4df7a69ac536ec0c1dfbe54c5e6127d800b0071cd0fd5bd4ea2c527b9116914307b1861df1444719b444e095875a0f
-
SSDEEP
12288:B8m1AIh29LbGd4DWusojt2KAXM3PmzlxL/tUaCr68iATcw2JzTmpK99PaUW0dDGE:B8mY
Malware Config
Extracted
redline
639820823_99
dragrun.top:28786
-
auth_value
530397d6b703221b919d6118285563cd
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 448 set thread context of 3204 448 Mail Access Checker By Blackbeard.exe 90 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 448 Mail Access Checker By Blackbeard.exe 448 Mail Access Checker By Blackbeard.exe 3204 AppLaunch.exe 3204 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 448 Mail Access Checker By Blackbeard.exe Token: SeDebugPrivilege 3204 AppLaunch.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 448 wrote to memory of 4212 448 Mail Access Checker By Blackbeard.exe 89 PID 448 wrote to memory of 4212 448 Mail Access Checker By Blackbeard.exe 89 PID 448 wrote to memory of 4212 448 Mail Access Checker By Blackbeard.exe 89 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90 PID 448 wrote to memory of 3204 448 Mail Access Checker By Blackbeard.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\mMail Access Checker By Blackbeard\Mail Access Checker By Blackbeard.exe"C:\Users\Admin\AppData\Local\Temp\mMail Access Checker By Blackbeard\Mail Access Checker By Blackbeard.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4212
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3204
-