Analysis
-
max time kernel
127s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2023, 02:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20230712-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230703-en
7 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
8.3MB
-
MD5
14438b7dc15aa98f7a7a25c2760659f7
-
SHA1
a68e6672b7054c63fe17315e363aa293819204b5
-
SHA256
e5d927bb8fb10465da3c5c732d10ef2afeac0345314564e20f9b03a4afcf8331
-
SHA512
c014d516984f9ef6a9f4cdb079c56a5a37cad78dfbd614702c8a2dd24242cfdf44edc4ae86204aee35095fc849bc1f0eeaf842259c74f01e79388ff3ffb32876
-
SSDEEP
196608:ceScO2cHLW+K3Hc0GlDMkOOCMTCBC44NM6mqiwImHw:ceSWMWX3+Dfc1F6zZit3
Score
10/10
Malware Config
Extracted
Family
redline
C2
95.217.14.200:16615
Attributes
-
auth_value
1bfac947c350008abe813772b735f0fc
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3880 set thread context of 3416 3880 Setup.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3416 vbc.exe 3416 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3416 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3880 wrote to memory of 3416 3880 Setup.exe 85 PID 3880 wrote to memory of 3416 3880 Setup.exe 85 PID 3880 wrote to memory of 3416 3880 Setup.exe 85 PID 3880 wrote to memory of 3416 3880 Setup.exe 85 PID 3880 wrote to memory of 3416 3880 Setup.exe 85 PID 3880 wrote to memory of 3416 3880 Setup.exe 85 PID 3880 wrote to memory of 3416 3880 Setup.exe 85 PID 3880 wrote to memory of 3416 3880 Setup.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3416
-