Analysis

  • max time kernel
    27s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-01-2021 07:26

General

  • Target

    c1c11c2deaa44f89902852b29dd3c263.exe

  • Size

    296KB

  • MD5

    c1c11c2deaa44f89902852b29dd3c263

  • SHA1

    add50de2b2001b21b1db5aaccac2d4b4742f8a58

  • SHA256

    64cd31d1eee9e95282294430654cc7e38065803da4d3b9167e92b3efd9645584

  • SHA512

    8aa8cd9bd26f9c02e0ce2399e9d9818c716323e611cd7aff4c6c3fe9b8cf151f4cfd37028149c4c3403f72343ae89695c59f4f9e3486a52dc29f10e82a0f3142

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1c11c2deaa44f89902852b29dd3c263.exe
    "C:\Users\Admin\AppData\Local\Temp\c1c11c2deaa44f89902852b29dd3c263.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-2-0x0000000004C10000-0x0000000004C21000-memory.dmp

    Filesize

    68KB

  • memory/1204-3-0x0000000006210000-0x0000000006221000-memory.dmp

    Filesize

    68KB

  • memory/1204-4-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/1204-5-0x0000000006620000-0x0000000006649000-memory.dmp

    Filesize

    164KB

  • memory/1204-6-0x0000000008A70000-0x0000000008A97000-memory.dmp

    Filesize

    156KB