Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
j8930172.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
j8930172.exe
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
j8930172.exe
-
Size
405KB
-
MD5
15e6ccca9ec2cdb3f98d29939293afa6
-
SHA1
f921d6e690c9b154efa1ec37baa24526ef79f12f
-
SHA256
639722b6340d2aefe6bec6cf9a2e5d47f69e46d794a9336bd9fde3f5c2c357f0
-
SHA512
853640befc288663f71148ec880b4c0338a0b24cd42b92512671284e79588d8f1df883b8ddc187813b4c56c9efd042bb51c528176b3a2ef58e085b36e55120ba
-
SSDEEP
6144:G0vJm09zORs+z/TMify9DAOVoQDmQ9WD+JcbK+UgLqc+t1FZX8/:Gcw09CK5N4t8Js5MF8/
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
monik
C2
77.91.124.82:19071
Attributes
-
auth_value
da7d9ea0878f5901f1f8319d34bdccea
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 2688 2100 j8930172.exe 30 -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2364 2100 j8930172.exe 28 PID 2100 wrote to memory of 2364 2100 j8930172.exe 28 PID 2100 wrote to memory of 2364 2100 j8930172.exe 28 PID 2100 wrote to memory of 2364 2100 j8930172.exe 28 PID 2100 wrote to memory of 2364 2100 j8930172.exe 28 PID 2100 wrote to memory of 2364 2100 j8930172.exe 28 PID 2100 wrote to memory of 2364 2100 j8930172.exe 28 PID 2100 wrote to memory of 3036 2100 j8930172.exe 29 PID 2100 wrote to memory of 3036 2100 j8930172.exe 29 PID 2100 wrote to memory of 3036 2100 j8930172.exe 29 PID 2100 wrote to memory of 3036 2100 j8930172.exe 29 PID 2100 wrote to memory of 3036 2100 j8930172.exe 29 PID 2100 wrote to memory of 3036 2100 j8930172.exe 29 PID 2100 wrote to memory of 3036 2100 j8930172.exe 29 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30 PID 2100 wrote to memory of 2688 2100 j8930172.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\j8930172.exe"C:\Users\Admin\AppData\Local\Temp\j8930172.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3036
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2688
-