Analysis

  • max time kernel
    136s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2023, 01:21

General

  • Target

    NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe

  • Size

    11.7MB

  • MD5

    69a568a135864396940144fff6f652ca

  • SHA1

    a9114775249469077b33353e646fef5aa160ab11

  • SHA256

    23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25

  • SHA512

    a79ffd039616fc518dbee8662450879e8864e008d37c355e4040580f580a5d0bb5f6e575e08f7b13232a34c463c91106d5cebbde6da59a080c9ae569f4728b46

  • SSDEEP

    196608:bzzKbBgpSjhv4u0UawvsX+sfrzSMC1138G41ILPUrd71gtX1cICMhg0YkH:PubOpGhguVs+krYKIj8x1WrhR

Malware Config

Extracted

Family

redline

C2

5.75.177.255:23682

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4852-11-0x0000000009220000-0x0000000009838000-memory.dmp

    Filesize

    6.1MB

  • memory/4852-9-0x0000000007E40000-0x0000000007E50000-memory.dmp

    Filesize

    64KB

  • memory/4852-24-0x0000000075290000-0x0000000075A40000-memory.dmp

    Filesize

    7.7MB

  • memory/4852-22-0x000000000CC10000-0x000000000D13C000-memory.dmp

    Filesize

    5.2MB

  • memory/4852-5-0x0000000075290000-0x0000000075A40000-memory.dmp

    Filesize

    7.7MB

  • memory/4852-4-0x0000000001200000-0x000000000123E000-memory.dmp

    Filesize

    248KB

  • memory/4852-7-0x0000000008080000-0x0000000008624000-memory.dmp

    Filesize

    5.6MB

  • memory/4852-13-0x0000000009140000-0x0000000009152000-memory.dmp

    Filesize

    72KB

  • memory/4852-12-0x000000000AAA0000-0x000000000ABAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4852-10-0x0000000007C90000-0x0000000007C9A000-memory.dmp

    Filesize

    40KB

  • memory/4852-21-0x000000000C510000-0x000000000C6D2000-memory.dmp

    Filesize

    1.8MB

  • memory/4852-20-0x000000000C2E0000-0x000000000C330000-memory.dmp

    Filesize

    320KB

  • memory/4852-8-0x0000000007BD0000-0x0000000007C62000-memory.dmp

    Filesize

    584KB

  • memory/4852-14-0x00000000091A0000-0x00000000091DC000-memory.dmp

    Filesize

    240KB

  • memory/4852-15-0x000000000AC80000-0x000000000ACCC000-memory.dmp

    Filesize

    304KB

  • memory/4852-16-0x0000000075290000-0x0000000075A40000-memory.dmp

    Filesize

    7.7MB

  • memory/4852-17-0x000000000B550000-0x000000000B5B6000-memory.dmp

    Filesize

    408KB

  • memory/4852-18-0x0000000007E40000-0x0000000007E50000-memory.dmp

    Filesize

    64KB

  • memory/4852-19-0x0000000007E40000-0x0000000007E50000-memory.dmp

    Filesize

    64KB

  • memory/4968-0-0x0000000075290000-0x0000000075A40000-memory.dmp

    Filesize

    7.7MB

  • memory/4968-1-0x0000000000450000-0x0000000001000000-memory.dmp

    Filesize

    11.7MB

  • memory/4968-6-0x0000000075290000-0x0000000075A40000-memory.dmp

    Filesize

    7.7MB

  • memory/4968-2-0x0000000005AB0000-0x0000000005AC0000-memory.dmp

    Filesize

    64KB