Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-05-2023 04:12

General

  • Target

    735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874.exe

  • Size

    337KB

  • MD5

    f8eb858177aa9334f5dac641740a876d

  • SHA1

    010de59da046fb3d8fc719b195b902f7fc3e5a62

  • SHA256

    735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874

  • SHA512

    fa113343343fc0a510fd4aadb8d35b2311a889f0abfc5fa170a531df28b56349bc55e7b838cbcd6d48a04ca83ed9c04b16c1181d633aa451f4884d38d6bb1867

  • SSDEEP

    6144:vdEkh2JJtk1HRLOmD6XctJ4jMzn90w6iqhv+TcIzAi:vdEm2JEhRim6MkjxRphvj0

Malware Config

Extracted

Family

redline

C2

135.181.241.192:4328

Attributes
  • auth_value

    a909e2aaecf96137978fea4f86400b9b

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874.exe
    "C:\Users\Admin\AppData\Local\Temp\735b6c9f76a6353543fbbd902d763b4b61b522f0a24df3de20ce7e70ebb8f874.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:932
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/888-55-0x0000000000090000-0x00000000000BE000-memory.dmp

    Filesize

    184KB

  • memory/888-56-0x0000000000090000-0x00000000000BE000-memory.dmp

    Filesize

    184KB

  • memory/888-60-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/888-63-0x0000000000090000-0x00000000000BE000-memory.dmp

    Filesize

    184KB

  • memory/888-62-0x0000000000090000-0x00000000000BE000-memory.dmp

    Filesize

    184KB

  • memory/888-64-0x00000000002F0000-0x00000000002F6000-memory.dmp

    Filesize

    24KB

  • memory/888-65-0x0000000004C20000-0x0000000004C60000-memory.dmp

    Filesize

    256KB

  • memory/888-66-0x0000000004C20000-0x0000000004C60000-memory.dmp

    Filesize

    256KB