Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2023 21:52
Static task
static1
Behavioral task
behavioral1
Sample
Setup Hack/Hack.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Setup Hack/Hack.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
Setup Hack/Hack.exe
Resource
win10v2004-20230703-en
General
-
Target
Setup Hack/Hack.exe
-
Size
2.4MB
-
MD5
a72a98d3af3f7afeb0859746621cbb96
-
SHA1
46bd27a8881f46432aed56096532099f531fda07
-
SHA256
25f2b8249f473ecbbdce0c8251584193a264d65a2e66cf2d436d6cc998131de7
-
SHA512
4111f8820d8d001c6e04433aaa790dde32b49899b2a55f0b26eefbde87e19ecd49f18d86b464d800c7e9780236b1dfc5a3ee6a828ee468bdb6f0433c7f2e8db8
-
SSDEEP
24576:752A3xTrSOlk1yk1g6YmBeJ5D5BtndadNK:/xTrSO+K6pBe4K
Malware Config
Extracted
redline
@Turbin63
94.142.138.4:80
-
auth_value
c9d51c45ece76628902c971fd5a55a1c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 696 set thread context of 4336 696 Hack.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 3400 696 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4336 AppLaunch.exe 4336 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4336 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 696 wrote to memory of 4336 696 Hack.exe 88 PID 696 wrote to memory of 4336 696 Hack.exe 88 PID 696 wrote to memory of 4336 696 Hack.exe 88 PID 696 wrote to memory of 4336 696 Hack.exe 88 PID 696 wrote to memory of 4336 696 Hack.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup Hack\Hack.exe"C:\Users\Admin\AppData\Local\Temp\Setup Hack\Hack.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 3002⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 696 -ip 6961⤵PID:4808