Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-11-2020 10:09

General

  • Target

    Slaking.exe

  • Size

    35KB

  • MD5

    77df4a375a27bfecc3c44317eff75bdc

  • SHA1

    49f11fad9a2522f198fa4cbe2df89171781177d3

  • SHA256

    154df0e5a18c811df58c1fab786001c5aa9d3a80640793578759a15a34597acb

  • SHA512

    42bf0500231241f953cea5c415afe37d60a8942ecd6cb0b7e79c42a24a1013b0989dcb3587068a6bcee77b2271c1ca9484d64f3a3791681949edc723b1f37a1b

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Slaking.exe
    "C:\Users\Admin\AppData\Local\Temp\Slaking.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/608-3-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/608-4-0x000000000040CD2F-mapping.dmp

  • memory/608-5-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/608-6-0x0000000001F60000-0x0000000001F71000-memory.dmp

    Filesize

    68KB

  • memory/608-7-0x0000000073200000-0x00000000738EE000-memory.dmp

    Filesize

    6.9MB

  • memory/608-8-0x0000000000450000-0x0000000000473000-memory.dmp

    Filesize

    140KB

  • memory/608-9-0x0000000001CC0000-0x0000000001CE2000-memory.dmp

    Filesize

    136KB

  • memory/1700-0-0x0000000073F20000-0x000000007460E000-memory.dmp

    Filesize

    6.9MB

  • memory/1700-1-0x0000000000F90000-0x0000000000F91000-memory.dmp

    Filesize

    4KB