Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/05/2023, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
327KB
-
MD5
b8a93e6bac133cce1dbc116cf39e8015
-
SHA1
863822623f218da910c20f86278480b5c19d5471
-
SHA256
b18c2839fdb9a12e5b52de597561ee6f320591b7974caf5a1f0af3e055d49061
-
SHA512
c8a61ca25ce3b9915597c7450eb74f0c0a8c0c0116ade597c4553345f2cde904504c0d61666ab80c5a9ec170fdd84a646426e9e09a65c79d1594545976b9bd58
-
SSDEEP
3072:GXOkKIsiRezHcBqk8teUC9utbZNYt7GyS7jeP70OE5L1E4Gh7+Lom6wD4tZVP4rm:GXOmRezHfFtbvjjE7auZComB4tHw97L
Malware Config
Extracted
redline
@CLOUDCOSMIC
157.254.164.98:28449
-
auth_value
c8ced34a15f6ccc97625aee05a0d1951
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1692 set thread context of 1324 1692 file.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1324 AppLaunch.exe 1324 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1324 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29 PID 1692 wrote to memory of 1324 1692 file.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1324
-