Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 20:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe
Resource
win10v2004-20231023-en
4 signatures
150 seconds
General
-
Target
a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe
-
Size
414KB
-
MD5
8df2641a982d5c42b1a26aad3c9b88fc
-
SHA1
c03a470acefdc61412d5b25d57b57eceef898d0d
-
SHA256
a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51
-
SHA512
b0205b47364f3f339892bd388b0ceb7c6cca468e04db896e9a5b6371c2039d4167cbbaf4c14f8aedb16a0283b0925e79ead6e4f1993b0f56b3b8378ce6637d13
-
SSDEEP
6144:NlUnkAlR2SaOmUPvbeAOiTY5kJZXfLPm2vEpy5Us420tfxul:YnkaR2Vke9SXXDPloy5Tufk
Score
10/10
Malware Config
Extracted
Family
redline
Botnet
taiga
C2
5.42.92.51:19057
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/2956-0-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90 PID 2380 wrote to memory of 2956 2380 a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe"C:\Users\Admin\AppData\Local\Temp\a8214be6431a029a423403db367166fb218a51c68b08027d204074e4d8aa7b51.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2956
-