Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-05-2024 09:30
Static task
static1
Behavioral task
behavioral1
Sample
bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe
Resource
win11-20240419-en
General
-
Target
bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe
-
Size
118KB
-
MD5
ef8ae6529fa9a347fe1d4fd5de64e871
-
SHA1
8ca07ac14d930cec45151ef720d8ba87b1c14fda
-
SHA256
bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50
-
SHA512
b39ed6f24d78de833a6b01d7edb062277a5bc891e854e3f03c0a1474fe7cf23390efc7002b58b5c02e427f85319e52bfae1438ed9b897b88bb3bc1080e0a11c7
-
SSDEEP
1536:ZnifVRWDRUv8x0GW7ThJOAu0t3YUfXShJU5QUWp89LLl2CHStw/legwdyW5yBzK:d0jWDRaoy7Ot0t3Ymq25rL0sege79ie
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4392-4-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3392 set thread context of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe 4392 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4392 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80 PID 3392 wrote to memory of 4392 3392 bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe"C:\Users\Admin\AppData\Local\Temp\bd05d68efa6c899217bea745a2c9e2ae6fdfe7551e7f4ba18586775e0040fd50.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-