Analysis
-
max time kernel
307s -
max time network
325s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
24/10/2023, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe
Resource
win10-20231020-en
General
-
Target
cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe
-
Size
1.1MB
-
MD5
290286f421ecf2742a5b1613b7290737
-
SHA1
86c98ef6b85eb3b199d6174f69136ac131f4de0d
-
SHA256
cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634
-
SHA512
e4eb7f96b4a7c5339950c5edbe313a0f1c73c01d87c954072c2710fcd596a11cc14d93ab1590c5bfb0640b59904b9e9d1b6de819f0d0fe0b6e4fda6c5a41383b
-
SSDEEP
24576:MZ8JWFMMh4jlauXOMd6XuCIOj2HgXsMSq:MZAMh4jlNXDgD+gcH
Malware Config
Extracted
redline
@oleh_ps
185.216.70.238:37515
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/2280-1-0x0000000005310000-0x000000000534E000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2644 set thread context of 2280 2644 cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe 72 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2280 2644 cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe 72 PID 2644 wrote to memory of 2280 2644 cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe 72 PID 2644 wrote to memory of 2280 2644 cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe 72 PID 2644 wrote to memory of 2280 2644 cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe 72 PID 2644 wrote to memory of 2280 2644 cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe"C:\Users\Admin\AppData\Local\Temp\cb70ad60ec16341e48b3e80868ea7fdcd3f630723dfa6335d7b79ed01dcd7634.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:2280
-