Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-08-2023 13:40
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
db31ac26d8102b251188f4616a2416ac
-
SHA1
f4f4fade8d50183cfe177a4a55c56f0a34621171
-
SHA256
43e4d06b7f480ab5b9491ae2f414a6d4cc6440a3156a3625f6949a67adff7c55
-
SHA512
17bd7b870edeec081664f58af3da93d2b89975c24d30a66a27c82e3eeb7b46aa766875b72448516d61018a6efb502692266d11db4b16b65fb3d969582edd69f4
-
SSDEEP
12288:Jb489PUjYfKB/3XhYEdZNlKA7SNV+Jxg1h0gnuY5CP5mkdSvy4t3n5r:JbBMYfKB/3XhYwrQr+J+fkWht35r
Malware Config
Extracted
redline
LogsDiller Cloud (Buy: @logsdillabot)
51.83.170.21:19447
-
auth_value
18f282243ca918bb8571dc26addba30e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2208 set thread context of 2220 2208 file.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2220 CasPol.exe 2220 CasPol.exe 2220 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2220 CasPol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28 PID 2208 wrote to memory of 2220 2208 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-