Analysis
-
max time kernel
134s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 12:26
Static task
static1
Behavioral task
behavioral1
Sample
a4cr.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
a4cr.exe
Resource
win10v2004-20230621-en
General
-
Target
a4cr.exe
-
Size
271KB
-
MD5
f95895e7becbfed7b5808b190cc58bf5
-
SHA1
76fc5f5e1bfd00695413c07835334aa097881017
-
SHA256
a1ccb714dc5a49c230ecf1b86239f9983024777d3ae1dbd42971b93fba4036e4
-
SHA512
4998457db76802ff24f31037809d286d4bb7a9feb4318d579f48ea8041c333a5a16037ba4687889bf0bda512718bf1c143c142c65220446b50dd8c18ff1d016e
-
SSDEEP
3072:FTLr+scTWSq02XceKBuO8888gV+PUtbtKTUX8pFxtpSQ2v/D:FiscT7DqVKBuO8888gV+zt7HK/D
Malware Config
Extracted
redline
a4
65.21.133.231:47430
-
auth_value
770e1e7fb0781851d5e2e8f9e720e0dc
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2480-135-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a4cr.exedescription pid process target process PID 604 set thread context of 2480 604 a4cr.exe vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a4cr.exedescription pid process target process PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe PID 604 wrote to memory of 2480 604 a4cr.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4cr.exe"C:\Users\Admin\AppData\Local\Temp\a4cr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2480