Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16/07/2023, 01:40
Static task
static1
Behavioral task
behavioral1
Sample
b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe
Resource
win10v2004-20230703-en
General
-
Target
b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe
-
Size
243KB
-
MD5
6d3a88a202ef9616439751588421a6de
-
SHA1
36830e973c50a88f0e49a201730af3e04c995c1f
-
SHA256
b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876
-
SHA512
59238849991a211296921af9861040bb35d0737f49320a6480d490af73509cc53f97a1c096e977a0dafb4c931bdbb7767c396e2340d9e67357c12608bd37cafd
-
SSDEEP
3072:YQLkmP451iuiDJYFPINDXQ38UT5xS5FEOcuuaKthrHeRKYIbWpu4E5I8:rLkmAkoKuOpudeRCKpui8
Malware Config
Extracted
redline
LogsDiller Cloud (Bot: @logsdillabot)
147.135.165.22:17748
-
auth_value
ed000008c0b59caf793b48c8ea9a7233
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2312 set thread context of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28 PID 2312 wrote to memory of 2080 2312 b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe"C:\Users\Admin\AppData\Local\Temp\b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe"C:\Users\Admin\AppData\Local\Temp\b57de37a80f74078a963dfc2ef5881250be4935b0dce103af1e1479195c09876.exe"2⤵PID:2080
-