Analysis
-
max time kernel
127s -
max time network
261s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
04/08/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe
Resource
win10-20230703-en
General
-
Target
260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe
-
Size
2.5MB
-
MD5
0d9a733c112c47e0293dece98f7dd2d9
-
SHA1
679a8d9b67f1384aacb26cabb6e07b6da72a30c4
-
SHA256
260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a
-
SHA512
2a051ae06a7c1dc3946128ed1f4cacb905a4b661cf03eff2c64372bd1a87d54e7b62c4a33388eafe84e9c92ed9ce1e46c8a600a0d88ff04dcf63eb2129e54121
-
SSDEEP
12288:e3wupYk4ubGyS9AcJSqrE4fdv4OT4rP453Tu4XfUH2HF9+h54K4HH:egupYkvbGyS90Qv4OPZ9UCFs0
Malware Config
Extracted
redline
1112224312
https://pastebin.com/raw/NgsUAPya
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4532 set thread context of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1028 InstallUtil.exe 1028 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1028 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71 PID 4532 wrote to memory of 1028 4532 260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe"C:\Users\Admin\AppData\Local\Temp\260e954d4df65c05e5b42a90e776b5657ec8a13ffbf520e79ab0dbaad5a54f8a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-