Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-06-2023 04:36
Static task
static1
Behavioral task
behavioral1
Sample
507a16cb87079ba90a8efe3a6baaa026.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
507a16cb87079ba90a8efe3a6baaa026.exe
Resource
win10v2004-20230220-en
General
-
Target
507a16cb87079ba90a8efe3a6baaa026.exe
-
Size
939KB
-
MD5
507a16cb87079ba90a8efe3a6baaa026
-
SHA1
b526a0a56488488f45d4277a9be5f3105806e0ad
-
SHA256
db78b5b857378304d5d72a826a2f1e261a71791eda971bf952cbd8182bbc62bd
-
SHA512
1193148b16891a5df52508366851c50379f05afed538882a4db5c65b345b1c1286d19de1c5f2adad09c411483fea9a6ea0038ffb624c03e42d752da27dda2b78
-
SSDEEP
6144:XmGoVjJhX8kQ/50Xi8wHi0I1GHXP3Or/c+rkGKZ:XXwX8kQBD8wHivGH/3Orc+rvKZ
Malware Config
Extracted
redline
1
95.216.249.153:81
-
auth_value
a290efd4796d37556cc5af7e83c91346
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 316 set thread context of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 660 316 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1376 AppLaunch.exe 1376 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1376 AppLaunch.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 1376 316 507a16cb87079ba90a8efe3a6baaa026.exe 29 PID 316 wrote to memory of 660 316 507a16cb87079ba90a8efe3a6baaa026.exe 30 PID 316 wrote to memory of 660 316 507a16cb87079ba90a8efe3a6baaa026.exe 30 PID 316 wrote to memory of 660 316 507a16cb87079ba90a8efe3a6baaa026.exe 30 PID 316 wrote to memory of 660 316 507a16cb87079ba90a8efe3a6baaa026.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\507a16cb87079ba90a8efe3a6baaa026.exe"C:\Users\Admin\AppData\Local\Temp\507a16cb87079ba90a8efe3a6baaa026.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 362⤵
- Program crash
PID:660
-