Analysis
-
max time kernel
52s -
max time network
91s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 10:49
Static task
static1
Behavioral task
behavioral1
Sample
4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe
Resource
win10v2004-20230915-en
General
-
Target
4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe
-
Size
381KB
-
MD5
e95dee5fcd5037f1008ddd5d310a8b58
-
SHA1
c372b99011b22f41386cff26087d6848191d545d
-
SHA256
4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b
-
SHA512
41b64a5bdeef61e70177d76ca039da3a86d51902e67d798148974d51ebab0445e8776ba8f4a383b7c891c6d5a76fd61e9118b45f5c07f1df06b63967a25ae11b
-
SSDEEP
6144:ORCulXui16lr+3jHBwDp6mAOfHPJNkivgHhlUpNn3WUzjwwc33viKC:ORnui16lrgmVHRwImyjjcPiKC
Malware Config
Extracted
redline
unique285
194.169.175.232:45451
-
auth_value
1ed06994a9a19d3729019cb69c1f61a6
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 -
Program crash 1 IoCs
pid pid_target Process procid_target 2772 2100 WerFault.exe 21 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3040 AppLaunch.exe 3040 AppLaunch.exe 3040 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3040 AppLaunch.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 3040 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 31 PID 2100 wrote to memory of 2772 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 32 PID 2100 wrote to memory of 2772 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 32 PID 2100 wrote to memory of 2772 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 32 PID 2100 wrote to memory of 2772 2100 4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe"C:\Users\Admin\AppData\Local\Temp\4f3ab894e7b94d0026ec632c24ebe877c8cb33c34dd77fbf0f967de5f3861e2b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 1202⤵
- Program crash
PID:2772
-