Analysis
-
max time kernel
124s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2023 21:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.3MB
-
MD5
f28730f469220391b679e575a48ddb0b
-
SHA1
d5863273efdb0e7e61007c4907441ce957e4f98a
-
SHA256
c0de3820d44c7aebc56f12be217cab5c5b758344750e73e1288f42e0f373f038
-
SHA512
667ed7bf96fa21b992889c02d95e2076e8417a7617b7767049a2c87ed668e1c189ecfc3c302d30b7a202d9abb93d8320a532ba018ff382bcb98cc96e53fe1327
-
SSDEEP
49152:VakDcq59geuk/NJW1BN0gQcI3EahBrZPTaZzn0WI78:09q5taPygQcI3EahBrNY/r
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
1
C2
45.88.3.253:26313
Attributes
-
auth_value
7280f9eb4f47693041f9f7d1fafe3acf
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2448 set thread context of 4000 2448 file.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 vbc.exe 4000 vbc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2448 file.exe Token: 33 2448 file.exe Token: SeIncBasePriorityPrivilege 2448 file.exe Token: SeDebugPrivilege 4000 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2448 wrote to memory of 4000 2448 file.exe 81 PID 2448 wrote to memory of 4000 2448 file.exe 81 PID 2448 wrote to memory of 4000 2448 file.exe 81 PID 2448 wrote to memory of 4000 2448 file.exe 81 PID 2448 wrote to memory of 4000 2448 file.exe 81 PID 2448 wrote to memory of 4000 2448 file.exe 81 PID 2448 wrote to memory of 4000 2448 file.exe 81 PID 2448 wrote to memory of 4000 2448 file.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000
-