Analysis
-
max time kernel
291s -
max time network
309s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2023, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
j3571179.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
j3571179.exe
Resource
win10-20230915-en
General
-
Target
j3571179.exe
-
Size
1.1MB
-
MD5
b80675ef3fff2ae08b03d4e5ce873a3a
-
SHA1
d4545c7d1c83b25fe9d51bd41bae29a3480b11b2
-
SHA256
ce826aa81606ddd05ae4d49cd87cf4b06803ed8794e15df8fa0f093b3ed8f357
-
SHA512
f135566939739ccf390e5890f776a6211b0513aaf293d926e49ae13e66ac1cf6ef68f2f28a3f82ea96a14ddf12b8838f32610c34676bac580484a895eba86370
-
SSDEEP
12288:HNsgAN2dA1o49i4ytPDxZ5ZVf95Tjz8LW6h4vIubLka8JPSttttzR3dLCA2:tsgq2dA1h9i4yt3VX39YPSttttzRsA2
Malware Config
Extracted
redline
prets
77.91.124.82:19071
-
auth_value
44ee9617e145f5ca73d49c1a4a0c2e34
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4604 set thread context of 3636 4604 j3571179.exe 73 -
Program crash 1 IoCs
pid pid_target Process procid_target 4580 4604 WerFault.exe 70 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4604 wrote to memory of 3136 4604 j3571179.exe 72 PID 4604 wrote to memory of 3136 4604 j3571179.exe 72 PID 4604 wrote to memory of 3136 4604 j3571179.exe 72 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73 PID 4604 wrote to memory of 3636 4604 j3571179.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\j3571179.exe"C:\Users\Admin\AppData\Local\Temp\j3571179.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3136
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 1322⤵
- Program crash
PID:4580
-