Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
02e3ce5f9cff3521b4e443a7a98955ab.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02e3ce5f9cff3521b4e443a7a98955ab.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
02e3ce5f9cff3521b4e443a7a98955ab.bin.exe
-
Size
1.2MB
-
MD5
02e3ce5f9cff3521b4e443a7a98955ab
-
SHA1
d022344ccf678b0d70f29770e54f836fb20eb737
-
SHA256
1551371a8c26e90e3ce229fd4f68351373e6bafcd7cfbe51e4892605bda772d0
-
SHA512
1ee18cda37cab9a25117fc609a6ecc088d89c40267679bb5e3b383e663e174996ab7c57a7a8d2d7ba92f33c40bcfd960ca94243902946fc9377a0780a0fa422d
-
SSDEEP
6144:SBsloyGJpqpn9PZZiQ3/0tAOVfuuJR+BnuonkENk6C8ZmMxonUMFO/NogCP2:S6XGJpqdNctbfpInuokWk6leQ2P2
Malware Config
Extracted
redline
@sogood1337
94.142.138.4:80
-
auth_value
55bcb57dbab66d380a24118a44c40da2
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4968 set thread context of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 448 InstallUtil.exe 448 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 448 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84 PID 4968 wrote to memory of 448 4968 02e3ce5f9cff3521b4e443a7a98955ab.bin.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e3ce5f9cff3521b4e443a7a98955ab.bin.exe"C:\Users\Admin\AppData\Local\Temp\02e3ce5f9cff3521b4e443a7a98955ab.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:448
-