Analysis
-
max time kernel
22s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230705-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
710KB
-
MD5
17d3bf32699ba6983b3c807117eb155e
-
SHA1
9b58bc21e5fcd5cbc5fb228da5b7482386cda943
-
SHA256
d35e7b84acffc8961da9ba5b2c097f4861622118919e2a430bac6f4fbad1195e
-
SHA512
e6f2a893776b3f3b9aae812b47c93abdd9779fbf7d3a6a0c6e84832bbc2249f5c273895f22762bd6be56f0f929bc850bed7b46e49244a24d5133c8c8e8585f63
-
SSDEEP
12288:RV2wCVzg+gQS2LoVbHFAMpX5cg4uauifNmHNqXiZEf9pJn:HGNKFA0XyScXxTh
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
@ytlogsbot
C2
176.123.9.85:16482
Attributes
-
auth_value
36b3ee30353ed1e6c1776af75fcfbc2c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 2176 1984 file.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 AppLaunch.exe 2176 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2176 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27 PID 1984 wrote to memory of 2176 1984 file.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-