Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe
-
Size
11.7MB
-
MD5
69a568a135864396940144fff6f652ca
-
SHA1
a9114775249469077b33353e646fef5aa160ab11
-
SHA256
23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25
-
SHA512
a79ffd039616fc518dbee8662450879e8864e008d37c355e4040580f580a5d0bb5f6e575e08f7b13232a34c463c91106d5cebbde6da59a080c9ae569f4728b46
-
SSDEEP
196608:bzzKbBgpSjhv4u0UawvsX+sfrzSMC1138G41ILPUrd71gtX1cICMhg0YkH:PubOpGhguVs+krYKIj8x1WrhR
Malware Config
Extracted
redline
5.75.177.255:23682
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4852-4-0x0000000001200000-0x000000000123E000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4968 set thread context of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4852 vbc.exe 4852 vbc.exe 4852 vbc.exe 4852 vbc.exe 4852 vbc.exe 4852 vbc.exe 4852 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4852 vbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91 PID 4968 wrote to memory of 4852 4968 NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.23c81c824177bc39dc8131bb8c25661ffecf0026501a7d074b49ff0eabc10b25.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-