Analysis
-
max time kernel
197s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
24-06-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe
Resource
win10-20240404-en
General
-
Target
adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe
-
Size
3.1MB
-
MD5
d3280c8db77e7d70bc80ad58e875dcf5
-
SHA1
e344a0bc5e42fba4ee4bd89827b46642481fb67c
-
SHA256
adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93
-
SHA512
3c3bdb76929d39fc83fb244dca15ddf358bc1fa0d447d28c4996c5c389cd411c396b6ca20d0dd64728b6e8ab13591c538cfdc01acc3c62a04793243646c28d2c
-
SSDEEP
49152:I5cmt/rNUf4GLsBxS+8cY3L0FnpyDLuNblwy:I5c+/osBxnE4npOuNblh
Malware Config
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
5.42.65.92:27953
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3056-67-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exedescription pid process target process PID 1768 set thread context of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
MSBuild.exepid process 3056 MSBuild.exe 3056 MSBuild.exe 3056 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe Token: SeDebugPrivilege 3056 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exedescription pid process target process PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe PID 1768 wrote to memory of 3056 1768 adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe"C:\Users\Admin\AppData\Local\Temp\adbf66605a6b569b3b4e915ad9cdf271c0889a14fc59b70233b2c966fca1dc93.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1768-24-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-43-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-2-0x00000000052B0000-0x000000000534C000-memory.dmpFilesize
624KB
-
memory/1768-3-0x00000000053C0000-0x00000000054CA000-memory.dmpFilesize
1.0MB
-
memory/1768-4-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/1768-5-0x00000000051E0000-0x00000000051FC000-memory.dmpFilesize
112KB
-
memory/1768-65-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-63-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-61-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-59-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-57-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-55-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-53-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-47-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-37-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-66-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/1768-51-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-49-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-45-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-6-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-41-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-39-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-35-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-33-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-31-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-29-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-1-0x0000000000720000-0x0000000000A42000-memory.dmpFilesize
3.1MB
-
memory/1768-27-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-15-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-69-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/1768-21-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-19-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-17-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-25-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-0-0x00000000738EE000-0x00000000738EF000-memory.dmpFilesize
4KB
-
memory/1768-13-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-11-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-10-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/1768-7-0x00000000051E0000-0x00000000051F5000-memory.dmpFilesize
84KB
-
memory/3056-83-0x0000000006F90000-0x0000000006FE0000-memory.dmpFilesize
320KB
-
memory/3056-70-0x0000000005430000-0x000000000592E000-memory.dmpFilesize
5.0MB
-
memory/3056-72-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/3056-71-0x0000000005010000-0x00000000050A2000-memory.dmpFilesize
584KB
-
memory/3056-73-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/3056-74-0x0000000005180000-0x000000000518A000-memory.dmpFilesize
40KB
-
memory/3056-75-0x0000000005F40000-0x0000000006546000-memory.dmpFilesize
6.0MB
-
memory/3056-76-0x0000000005930000-0x0000000005A3A000-memory.dmpFilesize
1.0MB
-
memory/3056-77-0x0000000005280000-0x0000000005292000-memory.dmpFilesize
72KB
-
memory/3056-78-0x00000000052E0000-0x000000000531E000-memory.dmpFilesize
248KB
-
memory/3056-79-0x0000000005320000-0x000000000536B000-memory.dmpFilesize
300KB
-
memory/3056-80-0x0000000005BE0000-0x0000000005C46000-memory.dmpFilesize
408KB
-
memory/3056-67-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/3056-82-0x0000000007170000-0x000000000769C000-memory.dmpFilesize
5.2MB
-
memory/3056-81-0x0000000006A70000-0x0000000006C32000-memory.dmpFilesize
1.8MB
-
memory/3056-84-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB
-
memory/3056-86-0x00000000738E0000-0x0000000073FCE000-memory.dmpFilesize
6.9MB