Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/07/2023, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
General
-
Target
file.exe
-
Size
378KB
-
MD5
3669aa55c05935ac296882cde2f785ba
-
SHA1
12e3d1f5479b92b88d83e625bae7831c59d61ecf
-
SHA256
420ea11f0973a7f7a4cf45a383861460b1171f5c3e05d1eab79dd64773f7f062
-
SHA512
c2084a7c64980199432dd6da4ef438b94f72fa9364b7f8fe18656a9dd3f5b298a63f80d984d93fe9f54084feb26a7f2a1948a7d6918b354ba5a37137bbea07ba
-
SSDEEP
6144:FY8LlxBmNsrdnwRDw/vzX3yq1sNJhtrzRsiwFvzA7l:+8ZLnaW/vT3yqkPdzkBE7l
Malware Config
Extracted
redline
LogsDiller Cloud (Telegram: @logsdillabot)
178.32.90.250:29608
-
auth_value
c2955ed3813a798683a185a82e949f88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1732 set thread context of 2240 1732 file.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 file.exe 2240 file.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2240 file.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30 PID 1732 wrote to memory of 2240 1732 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-