Analysis
-
max time kernel
149s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2023 17:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
xk555wjbvnhf3f.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
xk555wjbvnhf3f.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
xk555wjbvnhf3f.exe
-
Size
1.2MB
-
MD5
1a18fc4db3affaacf43f4022df7a2c32
-
SHA1
2ef240262c43bdd5f6a9db9f7e6abb1e408366ba
-
SHA256
b76a4488c5fa797828b85f998054f6e879b4c213d639f4501c725337b71e6c32
-
SHA512
be7ea1afa780dbe8bf70141566de147493bd6c276c64b45431e4ef3c46aecb5be28cea63f3a56188ba075b8aaae4edc400c0b07b6c05da0f4ce02a4ff5519069
-
SSDEEP
24576:RlG6qqgrdGA97sAVkIk3T+CBlrVd/3IaCWzHrDh:OqgrdGApsKkzplpOaCCDh
Score
10/10
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/3532-1-0x0000000000590000-0x000000000071E000-memory.dmp family_redline behavioral2/memory/2076-2-0x0000000000700000-0x000000000075A000-memory.dmp family_redline behavioral2/memory/3532-7-0x0000000000590000-0x000000000071E000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3532 set thread context of 2076 3532 xk555wjbvnhf3f.exe 86 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2076 3532 xk555wjbvnhf3f.exe 86 PID 3532 wrote to memory of 2076 3532 xk555wjbvnhf3f.exe 86 PID 3532 wrote to memory of 2076 3532 xk555wjbvnhf3f.exe 86 PID 3532 wrote to memory of 2076 3532 xk555wjbvnhf3f.exe 86 PID 3532 wrote to memory of 2076 3532 xk555wjbvnhf3f.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\xk555wjbvnhf3f.exe"C:\Users\Admin\AppData\Local\Temp\xk555wjbvnhf3f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2076
-