Analysis

  • max time kernel
    20s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-01-2021 07:30

General

  • Target

    c42c574acc963c0041700758094ab7fb.exe

  • Size

    343KB

  • MD5

    c42c574acc963c0041700758094ab7fb

  • SHA1

    5c3ff1be7da451976438f6f8c1fd1aadd8823093

  • SHA256

    5550b1e0d878ef2c7296596d9a7a44d380b48c77121d8cf4f04289ac7ab9a1e6

  • SHA512

    f2583334c76a21edac1f8b36bb3d72166d3b9fc0ba9da42c31b70facac666a5357cf20974854973fa6721d8754cdd28e77eb3a5d41ee73160fc8c223a433ca41

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c42c574acc963c0041700758094ab7fb.exe
    "C:\Users\Admin\AppData\Local\Temp\c42c574acc963c0041700758094ab7fb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1096-2-0x00000000046EE000-0x00000000046EF000-memory.dmp

    Filesize

    4KB

  • memory/1096-3-0x0000000005EF0000-0x0000000005F01000-memory.dmp

    Filesize

    68KB

  • memory/1096-4-0x0000000006030000-0x0000000006041000-memory.dmp

    Filesize

    68KB

  • memory/1096-5-0x00000000746F0000-0x0000000074DDE000-memory.dmp

    Filesize

    6.9MB

  • memory/1096-6-0x0000000004650000-0x0000000004679000-memory.dmp

    Filesize

    164KB

  • memory/1096-7-0x00000000062C0000-0x00000000062E7000-memory.dmp

    Filesize

    156KB