Analysis
-
max time kernel
89s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-05-2024 12:11
Behavioral task
behavioral1
Sample
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe
Resource
win11-20240426-en
General
-
Target
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe
-
Size
260KB
-
MD5
37088f94d2c94e755c357f3f9f552682
-
SHA1
04786e703a95aa0c8a230ab535fc4c98f19b813e
-
SHA256
be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603
-
SHA512
7ae3dc4ef91863a3ce2863efe23396761c0960596fce9220265f1e280b475b2f21620a913b616b8df65e9480e8d76790bcda40262125c19089b1b7a4ddbf3841
-
SSDEEP
3072:vI0qv0jb394UJB3ZG6eIMsd0QM4DZhrdBmG55l/XWoG4aiLfxxCoZn/UxF:Lqv0jb3JJzZXDfmWVXewLZxCB
Malware Config
Extracted
redline
5345987420
https://pastebin.com/raw/KE5Mft0T
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4572-1-0x0000000000B90000-0x0000000000BD6000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3436-4-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4572 set thread context of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe 3436 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3436 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79 PID 4572 wrote to memory of 3436 4572 be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe"C:\Users\Admin\AppData\Local\Temp\be3f82ed8f528e4c45a0c80390f6d97449592af559b9e0961427682dbbffd603.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-