Analysis
-
max time kernel
291s -
max time network
303s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-09-2023 06:11
Static task
static1
Behavioral task
behavioral1
Sample
k8303888.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
k8303888.exe
Resource
win10-20230831-en
General
-
Target
k8303888.exe
-
Size
419KB
-
MD5
5debbb56195829875cdceed4422c632c
-
SHA1
28f70c3d8269b56ea63495d75b03ccdfe016ea1e
-
SHA256
7fcefdae6d01431202b30b4b18eac815bc05a9e6dcc18b18b5055e4942aa5be7
-
SHA512
6006c457ba521597902c234233cd44ccc364c8380cd3f6ad7a475b91b28beea97318378af96e7907377c6261c1b0af7234b3590b0167e1eeb8b39f79de5c86ad
-
SSDEEP
6144:5Yba2/KMiCQy4bwSjQzL9ois436xMhAOjb74g/SiHQeMbbwbbbyGA3Lp:5x2SMiu4Ms436xMhNbWKMbbwbbby3t
Malware Config
Extracted
redline
tuco
77.91.124.82:19071
-
auth_value
dcfeb759bae9232de006fc3a4b34ac53
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
k8303888.exedescription pid process target process PID 2884 set thread context of 1332 2884 k8303888.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
k8303888.exedescription pid process target process PID 2884 wrote to memory of 2084 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 2084 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 2084 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 2084 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 2084 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 2084 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 2084 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe PID 2884 wrote to memory of 1332 2884 k8303888.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\k8303888.exe"C:\Users\Admin\AppData\Local\Temp\k8303888.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2084
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1332