Analysis
-
max time kernel
89s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-05-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe
Resource
win10v2004-20240419-en
General
-
Target
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe
-
Size
315KB
-
MD5
8593635e7692a063e8ffdf017a1b8b7f
-
SHA1
efcd70922a3d3577e617ff3fe78bbeeca43648e7
-
SHA256
32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82
-
SHA512
bd46e1344bb1c577260517fbecd126942b56b7e69c476af8ef6c3f104d96c3e5e1277be974b678af490a957ce6d3bbf7ad0f99911dc3dc68606a4981affe1c16
-
SSDEEP
6144:mi9pI60nbM8uPZy3+8KIDFquxMFQEjKP1dN9Vm8D5p9PGP0FXHS:/9+60nbnu6qaE7ePrN9D5p9nHS
Malware Config
Extracted
redline
708370717
https://pastebin.com/raw/KE5Mft0T
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/596-0-0x0000000000400000-0x0000000000422000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 1 pastebin.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3452 set thread context of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe 596 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 596 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4848 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 82 PID 3452 wrote to memory of 4848 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 82 PID 3452 wrote to memory of 4848 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 82 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83 PID 3452 wrote to memory of 596 3452 32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe"C:\Users\Admin\AppData\Local\Temp\32a85631c1dd953018924e3ab1e2cd00180ce5aa33a4c5c558e6840e869e8b82.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4848
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596
-