Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 10:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
05d2607674b12556392ad7d31c498bb2
-
SHA1
6a30c01505a666f109502e563df48287fc68af7b
-
SHA256
dc4df62efb7c9b410401653297e66098809afa302874d98711b82e20864a8049
-
SHA512
4f9019a34c89cc49b29ae808e272a5acb5e6bb18b4369cf826cc2ce46b41586418494ad535ef7d95408c86ff468457bb5227db619b0c64381172b3eecb77f549
-
SSDEEP
6144:vhMIAaYKyQdiU+oboLaSORJ3k5QH2rCfdOrAOGLNf9C42PVWI/L6VGuXZ:vhMvaYTQdiU+oboLLuiELNOPVWIzmfZ
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
2
C2
95.216.249.153:81
Attributes
-
auth_value
101013a5e99e0857595aae297a11351d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3032 set thread context of 1052 3032 file.exe 84 -
Program crash 1 IoCs
pid pid_target Process procid_target 2940 3032 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1052 RegSvcs.exe 1052 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 RegSvcs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1052 3032 file.exe 84 PID 3032 wrote to memory of 1052 3032 file.exe 84 PID 3032 wrote to memory of 1052 3032 file.exe 84 PID 3032 wrote to memory of 1052 3032 file.exe 84 PID 3032 wrote to memory of 1052 3032 file.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3032 -s 2722⤵
- Program crash
PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3032 -ip 30321⤵PID:4324