Analysis

  • max time kernel
    23s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 06:36

General

  • Target

    8b021c061663ac4e87fd8568b47268f8.exe

  • Size

    334KB

  • MD5

    8b021c061663ac4e87fd8568b47268f8

  • SHA1

    6c22ee34fb6a7b6f83d872ed8a96330a6874d229

  • SHA256

    b721b7bd732b96647e8603f5beaa7bd1a0ab6f861f525eeaae3927a367d4231e

  • SHA512

    30a42177b43e5b295f5497462ae963f2be7f7b4aaf656114fefc133de4a2def4f1629bcdb310e0234f684e65bc84874d5c9f3807632ebf659ff2ee3f387b786f

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b021c061663ac4e87fd8568b47268f8.exe
    "C:\Users\Admin\AppData\Local\Temp\8b021c061663ac4e87fd8568b47268f8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del ""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 3
        3⤵
        • Runs ping.exe
        PID:4016

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/528-2-0x0000000005029000-0x000000000502A000-memory.dmp
    Filesize

    4KB

  • memory/528-3-0x0000000006AB0000-0x0000000006AB1000-memory.dmp
    Filesize

    4KB

  • memory/528-4-0x0000000006AB0000-0x0000000006AB1000-memory.dmp
    Filesize

    4KB

  • memory/528-5-0x0000000006E60000-0x0000000006E61000-memory.dmp
    Filesize

    4KB

  • memory/528-6-0x0000000073B70000-0x000000007425E000-memory.dmp
    Filesize

    6.9MB

  • memory/528-7-0x0000000006C50000-0x0000000006C73000-memory.dmp
    Filesize

    140KB

  • memory/528-8-0x0000000009540000-0x0000000009541000-memory.dmp
    Filesize

    4KB

  • memory/528-9-0x0000000009470000-0x0000000009492000-memory.dmp
    Filesize

    136KB

  • memory/528-10-0x0000000009A40000-0x0000000009A41000-memory.dmp
    Filesize

    4KB

  • memory/528-11-0x000000000A050000-0x000000000A051000-memory.dmp
    Filesize

    4KB

  • memory/528-12-0x000000000A090000-0x000000000A091000-memory.dmp
    Filesize

    4KB

  • memory/528-13-0x000000000A0D0000-0x000000000A0D1000-memory.dmp
    Filesize

    4KB

  • memory/528-14-0x000000000A250000-0x000000000A251000-memory.dmp
    Filesize

    4KB

  • memory/528-15-0x000000000AF40000-0x000000000AF41000-memory.dmp
    Filesize

    4KB

  • memory/528-16-0x000000000B110000-0x000000000B111000-memory.dmp
    Filesize

    4KB

  • memory/528-17-0x000000000B730000-0x000000000B731000-memory.dmp
    Filesize

    4KB

  • memory/528-18-0x000000000B7F0000-0x000000000B7F1000-memory.dmp
    Filesize

    4KB

  • memory/528-19-0x000000000B880000-0x000000000B881000-memory.dmp
    Filesize

    4KB

  • memory/528-20-0x000000000BBF0000-0x000000000BBF1000-memory.dmp
    Filesize

    4KB

  • memory/528-21-0x000000000C810000-0x000000000C811000-memory.dmp
    Filesize

    4KB

  • memory/528-22-0x000000000C9A0000-0x000000000C9A1000-memory.dmp
    Filesize

    4KB

  • memory/1932-23-0x0000000000000000-mapping.dmp
  • memory/4016-24-0x0000000000000000-mapping.dmp