Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2023 13:50
Static task
static1
Behavioral task
behavioral1
Sample
ProtonVPN.exe
Resource
win7-20230220-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
ProtonVPN.exe
Resource
win10v2004-20230221-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
ProtonVPN.exe
-
Size
3.4MB
-
MD5
f900e0fa80afacf148edde94dc886426
-
SHA1
d44fc8bbd2307358a3a238426f577d2954626c49
-
SHA256
f91fa2060c2f01f47c27a87ec0e64c02e5f9bc25e645bd5ca83c3c06b8ab63bf
-
SHA512
d184380a2c1a3355260b91b6b88bea392f2f9dcd9bb8e2a19c2397ec5c450eef8a9f9a213142e0a1c2c9a49f904aecf291660dbf002905f094f1ba7ca61279d3
-
SSDEEP
98304:S9phoap/5L59WJUNw4U2xp3Qf/yaxP/WxCnNCp:wpe2/5L5kExKqCsCN8
Score
10/10
Malware Config
Extracted
Family
redline
C2
185.215.113.83:60722
Attributes
-
auth_value
134380858404c8c1907109561838d951
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/5108-136-0x0000000000500000-0x0000000000520000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4224 set thread context of 5108 4224 ProtonVPN.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 3444 4224 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4224 wrote to memory of 5108 4224 ProtonVPN.exe 85 PID 4224 wrote to memory of 5108 4224 ProtonVPN.exe 85 PID 4224 wrote to memory of 5108 4224 ProtonVPN.exe 85 PID 4224 wrote to memory of 5108 4224 ProtonVPN.exe 85 PID 4224 wrote to memory of 5108 4224 ProtonVPN.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ProtonVPN.exe"C:\Users\Admin\AppData\Local\Temp\ProtonVPN.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 4482⤵
- Program crash
PID:3444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4224 -ip 42241⤵PID:4192