Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 15:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
399KB
-
MD5
fab1aa4abe3f6eedaf46f4840eae7568
-
SHA1
aed72464992d8e8c2f84477c47cd84e40d45ae23
-
SHA256
9871bad0fe503c40a0eab3cf108ac0a92b390af6ff5022a1760d388719642672
-
SHA512
5d3c58b83986ebd102996b632bb970c3ac4f5224f1898f447afc59f1197d660591f1cb366ad5c3823ba1f7d41cb87da21385e33529733e3d42fbb39a5f30ee04
-
SSDEEP
6144:upxjES2jicP5iOo2T8VrSd/sUAOMclt0KzaNxEXkbReevzYQlqLBe1Sa:upxDqiG59ouuc8ikxEuNvz/Ie1Sa
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
smokiez
C2
194.169.175.232:45450
Attributes
-
auth_value
7b7d8a036038ab89b98f422d559b4f8f
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2356 set thread context of 2256 2356 file.exe 29 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29 PID 2356 wrote to memory of 2256 2356 file.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2256
-