Analysis
-
max time kernel
66s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
58dbc709c09abceac1becfe2ff10b430.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
58dbc709c09abceac1becfe2ff10b430.exe
Resource
win10v2004-20230220-en
General
-
Target
58dbc709c09abceac1becfe2ff10b430.exe
-
Size
365KB
-
MD5
58dbc709c09abceac1becfe2ff10b430
-
SHA1
dd996d90820a8b75a865739933dd871c77508c32
-
SHA256
a17f901cc5beb227d3619c18a9997555852aca101409c5dc504cf25f4729262f
-
SHA512
dc05b239aa29b9bb70585ad4db33bd0863698c71159125fecb10a5d44b9d481780d0229d18f2d39e80f94626fb70d96435e4b850ce83c614d481846072d8236f
-
SSDEEP
6144:yYSOGk+3NmAO6crcgIfKrbSlHyLK6SlOkNx+uQl/d:VSOD+3NmhGKry6SlO5uQ
Malware Config
Extracted
redline
45.15.157.147:37535
-
auth_value
69d4f1af428790964f316100b6634867
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 4344 2796 58dbc709c09abceac1becfe2ff10b430.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4344 AppLaunch.exe 4344 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4344 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2796 wrote to memory of 4344 2796 58dbc709c09abceac1becfe2ff10b430.exe 85 PID 2796 wrote to memory of 4344 2796 58dbc709c09abceac1becfe2ff10b430.exe 85 PID 2796 wrote to memory of 4344 2796 58dbc709c09abceac1becfe2ff10b430.exe 85 PID 2796 wrote to memory of 4344 2796 58dbc709c09abceac1becfe2ff10b430.exe 85 PID 2796 wrote to memory of 4344 2796 58dbc709c09abceac1becfe2ff10b430.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\58dbc709c09abceac1becfe2ff10b430.exe"C:\Users\Admin\AppData\Local\Temp\58dbc709c09abceac1becfe2ff10b430.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344
-