Analysis
-
max time kernel
1189s -
max time network
1197s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 22:04
Static task
static1
Behavioral task
behavioral1
Sample
AutoInstall.exe
Resource
win10v2004-20231020-en
General
-
Target
AutoInstall.exe
-
Size
1.8MB
-
MD5
d22dea0339065ec05cccf525b72a7b12
-
SHA1
fb73af59c4498f28ffd714d467551ec465b77d7d
-
SHA256
92cf7bd32bc8125a758cafd97fc06559994b57ed94f641f74f2da07de284aff3
-
SHA512
9b947179aac2233f83e24f5892aeeba2aa2240f5bf32d323395e712ae02844b04e56abbea16e6e7c34559b7a4ad5ab53a9049bf6eb2a31cbcb59be180dfde573
-
SSDEEP
49152:8LJyCp/gah3h6AS6UFfrHDu7kLNKxe1iuIy8EpDOPSFVF6:8Nb1V5S3rHDugLNKxAgiOPqi
Malware Config
Extracted
redline
@SDSAads2
104.168.44.52:80
-
auth_value
589d0e9314616e09f68efd12b2086ab8
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1764 set thread context of 4252 1764 AutoInstall.exe 89 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1764 wrote to memory of 4252 1764 AutoInstall.exe 89 PID 1764 wrote to memory of 4252 1764 AutoInstall.exe 89 PID 1764 wrote to memory of 4252 1764 AutoInstall.exe 89 PID 1764 wrote to memory of 4252 1764 AutoInstall.exe 89 PID 1764 wrote to memory of 4252 1764 AutoInstall.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoInstall.exe"C:\Users\Admin\AppData\Local\Temp\AutoInstall.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:4252
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD544baf247439d959cdcaa5905a74f8e1d
SHA1d9fde365d234c1a420219e35e84454da681313cc
SHA2569093af0de8a63c4c226443d5a7b1ba274dab97403435546d5897ddad5844bb64
SHA5120dde1a974fb3f13041537f3ad8d39f14fe73b02c3406790af56169547ce6e61547acd8063f126496ae6c62f9871e2e8fa3f782820d913d52b1b9dc5194da9a4b