Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-12-2020 19:58

General

  • Target

    efd360b2356c73705b720b6a75fb5376.exe

  • Size

    1.1MB

  • MD5

    efd360b2356c73705b720b6a75fb5376

  • SHA1

    6bf80e400bad4ad4755c2d6cfb987dc3a999316a

  • SHA256

    5637daf1b0a5e312bf2118b89083c186fa32f074a12006ef7df0e49ce51f40c1

  • SHA512

    d7c9624c1715b70528d5e54a0f3281c4a9d2c0ac15230401cd12b976df4108c65364f274d42b5f8389ba1361b7ae12c9460630cccc47b32b1098bc64722e47fa

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efd360b2356c73705b720b6a75fb5376.exe
    "C:\Users\Admin\AppData\Local\Temp\efd360b2356c73705b720b6a75fb5376.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:596
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/596-2-0x0000000073D40000-0x000000007442E000-memory.dmp

    Filesize

    6.9MB

  • memory/596-3-0x0000000000A10000-0x0000000000A11000-memory.dmp

    Filesize

    4KB

  • memory/596-5-0x0000000000440000-0x0000000000457000-memory.dmp

    Filesize

    92KB

  • memory/596-6-0x00000000004C0000-0x00000000004DF000-memory.dmp

    Filesize

    124KB

  • memory/596-7-0x00000000004E0000-0x00000000004EA000-memory.dmp

    Filesize

    40KB

  • memory/1712-8-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1712-9-0x0000000000420CEA-mapping.dmp

  • memory/1712-11-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1712-10-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1712-12-0x0000000073020000-0x000000007370E000-memory.dmp

    Filesize

    6.9MB