Analysis
-
max time kernel
53s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13/05/2023, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
MilTLoader.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
MilTLoader.exe
Resource
win10v2004-20230220-en
General
-
Target
MilTLoader.exe
-
Size
348KB
-
MD5
d7bd4498c54d9b6c2d330f27c69c80be
-
SHA1
b00aafa10d0a63545c7c304733c8e0042158839a
-
SHA256
41cf59c6e25e08a8f481d168b82b8e186030a061ce880e0ba2eb46024c4e3042
-
SHA512
3bbdad9c8213e8d9db22c19df7261fa01309e6bf2dbf9a377d7c87ad448a8770e676f55a9ab2feac63021363f3a952e6bce0eab443345b860611f38302aa691d
-
SSDEEP
6144:BJRbsPONS6+Tvq3BeIM8eW1BoRvEAnxYBoEyQA8OQfFhvqims1En:BJ26wqxeI578nxwG8xNVZyn
Malware Config
Extracted
redline
@aspix4a
94.142.138.4:80
-
auth_value
9c7cb4481d622bd4b5824f91b56d3c35
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1268 set thread context of 1156 1268 MilTLoader.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1156 AppLaunch.exe 1156 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1156 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29 PID 1268 wrote to memory of 1156 1268 MilTLoader.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\MilTLoader.exe"C:\Users\Admin\AppData\Local\Temp\MilTLoader.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-