Analysis
-
max time kernel
44s -
max time network
82s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 08:57
Static task
static1
Behavioral task
behavioral1
Sample
autorun.exe
Resource
win7-20230831-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
autorun.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
autorun.exe
-
Size
1.0MB
-
MD5
4e3304bd81a45a4a02d298dc508194c0
-
SHA1
b09d6899f03e48da77fee9e905741793064e116e
-
SHA256
613f058b34419fa46aaf71c61ec0afe963c133e023b6f75d889fb67395ddaf1b
-
SHA512
eecf0d026900af4157ec4f53428dd9af54ee29ca10187d08e9227f64265d6ac4c86a85bcb54bdc4f301d9ee8d842711db36653225c30a188073ed655ad44a901
-
SSDEEP
24576:YM573oyJAzoy99wIqjQfgia8gzhkxsWSPjmJRGYPVs:YM573oyy99wICQB22x/m
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
unique285
C2
194.169.175.232:45451
Attributes
-
auth_value
1ed06994a9a19d3729019cb69c1f61a6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2600 2752 autorun.exe 29 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2600 vbc.exe 2600 vbc.exe 2600 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2600 vbc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29 PID 2752 wrote to memory of 2600 2752 autorun.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\autorun.exe"C:\Users\Admin\AppData\Local\Temp\autorun.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-