Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2023 14:32
Static task
static1
Behavioral task
behavioral1
Sample
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe
Resource
win10v2004-20231020-en
General
-
Target
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe
-
Size
1.1MB
-
MD5
dcc50df94a2741682e1899444e81ebeb
-
SHA1
7b8b68244aa04e36b9a85e78d306b9dafccbf33b
-
SHA256
47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a
-
SHA512
6764c83c26717ec2af28c1dc758404583233bc6eba9483a92c9d94d814b35f4bcb0a09bac146b569a876adf79a299228ef8e1ba49f5c12a1e7eb78696f11def8
-
SSDEEP
12288:WZLxMjbRoaZei8jhA9iH9x6y0BFKhTZvF9+mKe5OLfaY2X1R7RIsEPYsulocuvMp:aWjFoaZeDhA9iH9r08vSaYoRsPYB3a/Y
Malware Config
Extracted
redline
Installs3000_20231023
62.72.23.19:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3804-1-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3548 set thread context of 3804 3548 47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe 88 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3804 vbc.exe 3804 vbc.exe 3804 vbc.exe 3804 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3804 vbc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3548 wrote to memory of 3804 3548 47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe 88 PID 3548 wrote to memory of 3804 3548 47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe 88 PID 3548 wrote to memory of 3804 3548 47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe 88 PID 3548 wrote to memory of 3804 3548 47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe 88 PID 3548 wrote to memory of 3804 3548 47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe"C:\Users\Admin\AppData\Local\Temp\47d0414f022c7f0fe5d1a1276b4759fba16ed350b636fb25ca167049f82de46a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804
-