Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2023, 20:31 UTC

General

  • Target

    0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af.exe

  • Size

    270KB

  • MD5

    e087e1b8cb04c48eb29e65d30096538f

  • SHA1

    abbcdf9f148557c890808dd81646da7bea1c50ef

  • SHA256

    0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af

  • SHA512

    b906b658371b2d50e79761d4bf6ba4d4f601c5c9c27e5bbda4cffbb1381136bbf714e0dd700417a4db44b99a9c26f22b097c8d959f65042e21c8a1633007edcd

  • SSDEEP

    6144:1QGVr+2WwvTygXUNVS4MGh1aBFrvz1xcxcr:TVrZyR1aBFrvz1xcx

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af.exe
    "C:\Users\Admin\AppData\Local\Temp\0b5af3f9011463f772d3ec2077228b0f1347a9fa464e00f4338b0dd81de2b4af.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 148
      2⤵
      • Program crash
      PID:5020
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1180 -ip 1180
    1⤵
      PID:4340

    Network

    • flag-us
      DNS
      28.118.140.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      28.118.140.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      129.73.97.83.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      129.73.97.83.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      217.106.137.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      217.106.137.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      14.103.197.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      14.103.197.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      63.13.109.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      63.13.109.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      104.219.191.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.219.191.52.in-addr.arpa
      IN PTR
      Response
    • 83.97.73.129:19068
      AppLaunch.exe
      11.0kB
      7.3kB
      39
      28
    • 52.242.101.226:443
      260 B
      5
    • 13.89.179.9:443
      322 B
      7
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      260 B
      5
    • 173.223.113.164:443
      322 B
      7
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      260 B
      5
    • 52.242.101.226:443
      208 B
      4
    • 52.242.101.226:443
      156 B
      3
    • 8.8.8.8:53
      28.118.140.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      28.118.140.52.in-addr.arpa

    • 8.8.8.8:53
      129.73.97.83.in-addr.arpa
      dns
      71 B
      131 B
      1
      1

      DNS Request

      129.73.97.83.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      217.106.137.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      217.106.137.52.in-addr.arpa

    • 8.8.8.8:53
      14.103.197.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      14.103.197.20.in-addr.arpa

    • 8.8.8.8:53
      63.13.109.52.in-addr.arpa
      dns
      71 B
      145 B
      1
      1

      DNS Request

      63.13.109.52.in-addr.arpa

    • 8.8.8.8:53
      104.219.191.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      104.219.191.52.in-addr.arpa

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1160-133-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1160-138-0x000000000B290000-0x000000000B8A8000-memory.dmp

      Filesize

      6.1MB

    • memory/1160-139-0x000000000ADD0000-0x000000000AEDA000-memory.dmp

      Filesize

      1.0MB

    • memory/1160-140-0x000000000AD10000-0x000000000AD22000-memory.dmp

      Filesize

      72KB

    • memory/1160-141-0x000000000AD70000-0x000000000ADAC000-memory.dmp

      Filesize

      240KB

    • memory/1160-142-0x00000000057E0000-0x00000000057F0000-memory.dmp

      Filesize

      64KB

    • memory/1160-143-0x000000000B080000-0x000000000B0F6000-memory.dmp

      Filesize

      472KB

    • memory/1160-144-0x000000000B1A0000-0x000000000B232000-memory.dmp

      Filesize

      584KB

    • memory/1160-145-0x000000000BE60000-0x000000000C404000-memory.dmp

      Filesize

      5.6MB

    • memory/1160-146-0x000000000B9B0000-0x000000000BA16000-memory.dmp

      Filesize

      408KB

    • memory/1160-147-0x000000000BDD0000-0x000000000BE20000-memory.dmp

      Filesize

      320KB

    • memory/1160-148-0x00000000057E0000-0x00000000057F0000-memory.dmp

      Filesize

      64KB

    • memory/1160-149-0x000000000C6E0000-0x000000000C8A2000-memory.dmp

      Filesize

      1.8MB

    • memory/1160-150-0x000000000CDE0000-0x000000000D30C000-memory.dmp

      Filesize

      5.2MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.