Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/06/2023, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
922a01631ed814d55884f63c543f7d1b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
922a01631ed814d55884f63c543f7d1b.exe
Resource
win10v2004-20230221-en
General
-
Target
922a01631ed814d55884f63c543f7d1b.exe
-
Size
282KB
-
MD5
922a01631ed814d55884f63c543f7d1b
-
SHA1
c5a41516fc9ad17ba6d41766e11bb4249ba74037
-
SHA256
b6b2ae64276946889a9d2e1858dae29cf7c98c870df586d82d993185dc401157
-
SHA512
6cea6c251289396afcd223ff1b6900fad8045116c91e59dbf89719fdc248c40739f7e56a4f017393143b1a8066289cecd6c6a00589c95fc6f96fc7d71cee3a87
-
SSDEEP
6144:mQvoWvJw5U7wvTygXUNVS4MGh1aBFrvz1xcxcWhGrtl:mUI1yR1aBFrvz1xcxdGrtl
Malware Config
Extracted
redline
sheron
83.97.73.129:19068
-
auth_value
2d067e7e2372227d3a03b335260112e9
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1408 set thread context of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1184 AppLaunch.exe 1184 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1184 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28 PID 1408 wrote to memory of 1184 1408 922a01631ed814d55884f63c543f7d1b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\922a01631ed814d55884f63c543f7d1b.exe"C:\Users\Admin\AppData\Local\Temp\922a01631ed814d55884f63c543f7d1b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184
-