Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2023, 05:14

General

  • Target

    i1644011.exe

  • Size

    304KB

  • MD5

    2f6ea5b99ca33f4951938f8fe3ac478d

  • SHA1

    8068319d2cb1d79196b73e65f1841202d0d99100

  • SHA256

    88dbdd424e655c1a6f39fbd916138b953987ccabcb22babf0382e5eab7782839

  • SHA512

    3fc91a75978b3cfe2a9473703aa9a1a375890a9f6307953b708013af53045e652684fa35475bfdff2c0745043194635606b2e4e2c84421d12ee93a5eefe14452

  • SSDEEP

    6144:7rRCtFmE8QxL0SYZ3gOkB4XreVyDuAPN9/Qewn3tPlEKsgGE:pCtF0rekDuA1JuHIgp

Malware Config

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\i1644011.exe
    "C:\Users\Admin\AppData\Local\Temp\i1644011.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1156

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1156-54-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1156-55-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1156-59-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

          Filesize

          4KB

        • memory/1156-62-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1156-61-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1156-63-0x0000000000440000-0x0000000000446000-memory.dmp

          Filesize

          24KB

        • memory/1156-64-0x0000000004AF0000-0x0000000004B30000-memory.dmp

          Filesize

          256KB