Analysis
-
max time kernel
135s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 12:11
Behavioral task
behavioral1
Sample
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe
Resource
win11-20240426-en
General
-
Target
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe
-
Size
260KB
-
MD5
37088f94d2c94e755c357f3f9f552682
-
SHA1
04786e703a95aa0c8a230ab535fc4c98f19b813e
-
SHA256
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603
-
SHA512
7ae3dc4ef91863a3ce2863efe23396761c0960596fce9220265f1e280b475b2f21620a913b616b8df65e9480e8d76790bcda40262125c19089b1b7a4ddbf3841
-
SSDEEP
3072:vI0qv0jb394UJB3ZG6eIMsd0QM4DZhrdBmG55l/XWoG4aiLfxxCoZn/UxF:Lqv0jb3JJzZXDfmWVXewLZxCB
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/4560-1-0x0000000000E20000-0x0000000000E66000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral1/memory/1944-4-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 3 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4560 set thread context of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe 1944 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1944 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85 PID 4560 wrote to memory of 1944 4560 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe"C:\Users\Admin\AppData\Local\Temp\be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-