Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2023, 13:47

General

  • Target

    e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331.exe

  • Size

    262KB

  • MD5

    b4c1712e349f7a27ddfaf04903689a5d

  • SHA1

    73e6e912f16fa055f2c2dc3c24eacb6e5579a387

  • SHA256

    e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331

  • SHA512

    1892ffc637482fff072887bde70f017a3f6c54ff63e287f2ae7e2bc4e3ac1ca037a52009b7125f8544b9d18b15dd97c342ebf300c5b4ee71b02a93e34d6ff155

  • SSDEEP

    3072:Ox/qx1OuyRyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:a/qx1aEFaQ7W05AEezbMPZFzAy2Sc

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331.exe
    "C:\Users\Admin\AppData\Local\Temp\e3032fb7c20b5a6a724b2b2586965d05d804dfe15737197cc34a9466d87f4331.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
        PID:4116
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4628 -s 148
        2⤵
        • Program crash
        PID:1896
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4628 -ip 4628
      1⤵
        PID:4180

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4116-134-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/4116-139-0x0000000005590000-0x0000000005BA8000-memory.dmp

        Filesize

        6.1MB

      • memory/4116-140-0x0000000005080000-0x000000000518A000-memory.dmp

        Filesize

        1.0MB

      • memory/4116-141-0x0000000004F70000-0x0000000004F82000-memory.dmp

        Filesize

        72KB

      • memory/4116-142-0x0000000004FD0000-0x000000000500C000-memory.dmp

        Filesize

        240KB

      • memory/4116-143-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4116-144-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4116-145-0x0000000000AB0000-0x0000000000B26000-memory.dmp

        Filesize

        472KB

      • memory/4116-146-0x0000000000E50000-0x0000000000EE2000-memory.dmp

        Filesize

        584KB

      • memory/4116-147-0x0000000006650000-0x0000000006BF4000-memory.dmp

        Filesize

        5.6MB

      • memory/4116-148-0x0000000000EF0000-0x0000000000F56000-memory.dmp

        Filesize

        408KB