Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2024 05:26

General

  • Target

    GV98M42D.exe

  • Size

    391KB

  • MD5

    2f1095c5644e8afde1ba821e998878e9

  • SHA1

    00c0f5275aa8984c73c13a24a62f91d14ac94b8c

  • SHA256

    b2dc756068dd61fae1beec87706b0ef32406c2ef6df0bdd4d6ade018ce730700

  • SHA512

    0d63b686f13c64a73f629c626267a00cf0a599c9b6fd82bae96fbc7a1cbda2cdaa8ece5ff2ecb729dd1c311f40414fb4f7708afd4f6e02363fdc45df35aca430

  • SSDEEP

    12288:YTxmwqr83R3GaF4JjQoPi3pL5+68iERbHK1:YTxFqr8LWjREpLkjG

Malware Config

Extracted

Family

redline

Botnet

gorod

C2

159.69.179.151:12807

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GV98M42D.exe
    "C:\Users\Admin\AppData\Local\Temp\GV98M42D.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:3996
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1396
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:3176

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/768-11-0x0000000075100000-0x00000000758B0000-memory.dmp

        Filesize

        7.7MB

      • memory/768-0-0x0000000075100000-0x00000000758B0000-memory.dmp

        Filesize

        7.7MB

      • memory/768-4-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

        Filesize

        4KB

      • memory/768-3-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

        Filesize

        4KB

      • memory/768-1-0x0000000000360000-0x00000000003C8000-memory.dmp

        Filesize

        416KB

      • memory/768-7-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

        Filesize

        4KB

      • memory/768-2-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1396-14-0x0000000004FF0000-0x0000000004FFA000-memory.dmp

        Filesize

        40KB

      • memory/1396-19-0x0000000006120000-0x000000000616C000-memory.dmp

        Filesize

        304KB

      • memory/1396-10-0x0000000005320000-0x00000000058C4000-memory.dmp

        Filesize

        5.6MB

      • memory/1396-8-0x0000000075100000-0x00000000758B0000-memory.dmp

        Filesize

        7.7MB

      • memory/1396-13-0x00000000050A0000-0x00000000050B0000-memory.dmp

        Filesize

        64KB

      • memory/1396-5-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/1396-15-0x0000000006340000-0x0000000006958000-memory.dmp

        Filesize

        6.1MB

      • memory/1396-17-0x0000000005F30000-0x0000000005F42000-memory.dmp

        Filesize

        72KB

      • memory/1396-16-0x0000000006010000-0x000000000611A000-memory.dmp

        Filesize

        1.0MB

      • memory/1396-12-0x0000000004E30000-0x0000000004EC2000-memory.dmp

        Filesize

        584KB

      • memory/1396-18-0x0000000005F90000-0x0000000005FCC000-memory.dmp

        Filesize

        240KB

      • memory/1396-20-0x00000000062A0000-0x0000000006306000-memory.dmp

        Filesize

        408KB

      • memory/1396-22-0x0000000008070000-0x0000000008232000-memory.dmp

        Filesize

        1.8MB

      • memory/1396-23-0x0000000008770000-0x0000000008C9C000-memory.dmp

        Filesize

        5.2MB

      • memory/1396-21-0x0000000007E50000-0x0000000007EA0000-memory.dmp

        Filesize

        320KB

      • memory/1396-24-0x0000000075100000-0x00000000758B0000-memory.dmp

        Filesize

        7.7MB

      • memory/1396-25-0x00000000050A0000-0x00000000050B0000-memory.dmp

        Filesize

        64KB

      • memory/1396-27-0x0000000075100000-0x00000000758B0000-memory.dmp

        Filesize

        7.7MB