Analysis
-
max time kernel
90s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/05/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe
Resource
win11-20240419-en
General
-
Target
efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe
-
Size
118KB
-
MD5
bf58111f2bcc88887ccf6aa6b894bfe2
-
SHA1
3b1983b94aa4fb41a84a641c9e78377e14003c49
-
SHA256
efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad
-
SHA512
a5f0157593a5329aea24ff730115358d88809d22a4100ce52c99ffaad753c80e85e0c3647e1ad5a158b55448175c465ef06a80e22a9f733a4164a898974aef88
-
SSDEEP
3072:P1V2YgODlGIrfQxwI8lXn0QvtECo0FSCRs:P1V/9GIrf2oXnNtECo0FP
Malware Config
Extracted
redline
5637482599
https://pastebin.com/raw/NgsUAPya
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/4056-4-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3768 set thread context of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe 4056 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4056 RegAsm.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81 PID 3768 wrote to memory of 4056 3768 efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe"C:\Users\Admin\AppData\Local\Temp\efed91ccf386c9b8115ab66e40af300619081cc033184d10f7f081a100445dad.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056
-