Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/06/2023, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
i1644011.exe
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
i1644011.exe
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
i1644011.exe
-
Size
304KB
-
MD5
2f6ea5b99ca33f4951938f8fe3ac478d
-
SHA1
8068319d2cb1d79196b73e65f1841202d0d99100
-
SHA256
88dbdd424e655c1a6f39fbd916138b953987ccabcb22babf0382e5eab7782839
-
SHA512
3fc91a75978b3cfe2a9473703aa9a1a375890a9f6307953b708013af53045e652684fa35475bfdff2c0745043194635606b2e4e2c84421d12ee93a5eefe14452
-
SSDEEP
6144:7rRCtFmE8QxL0SYZ3gOkB4XreVyDuAPN9/Qewn3tPlEKsgGE:pCtF0rekDuA1JuHIgp
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
brain
C2
83.97.73.126:19046
Attributes
-
auth_value
5fb8269baadec0c49899b9a7a0c8851f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 1156 1712 i1644011.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1156 AppLaunch.exe 1156 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1156 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28 PID 1712 wrote to memory of 1156 1712 i1644011.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\i1644011.exe"C:\Users\Admin\AppData\Local\Temp\i1644011.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156
-