Analysis
-
max time kernel
299s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
02-05-2024 06:14
Static task
static1
Behavioral task
behavioral1
Sample
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe
Resource
win10-20240404-en
General
-
Target
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe
-
Size
1.7MB
-
MD5
cd956b35a1378870c1aafd2d2d5a6621
-
SHA1
3dc055ee508e725b648566284cd76eee987d20f0
-
SHA256
dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46
-
SHA512
e194d936dee2fb0c4a91ada07a43353df877a185d85176c06619d6264ae9d3b53e31af92ee50cfb90d27c9330ed8bcf9e01629835796b3105684ec5e7e4b40cd
-
SSDEEP
49152:VFKcjeOqD/WNb+1hY4fOVlT/DKu9Lq7V9B8:VFS/Yb+1hY4fOVlT/DKu9Lq
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1124-2-0x0000000000150000-0x00000000001AA000-memory.dmp family_redline -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4904 set thread context of 1124 4904 dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe 74 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1124 4904 dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe 74 PID 4904 wrote to memory of 1124 4904 dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe 74 PID 4904 wrote to memory of 1124 4904 dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe 74 PID 4904 wrote to memory of 1124 4904 dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe 74 PID 4904 wrote to memory of 1124 4904 dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe"C:\Users\Admin\AppData\Local\Temp\dbb7984df83f7a7bf7dd3335d963839f9dec74fc7cb83cea840ec2141949cf46.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1124
-