Analysis
-
max time kernel
24s -
max time network
22s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-03-2021 14:02
Static task
static1
Behavioral task
behavioral1
Sample
1d4f86998febcd63769ffabf86ad4177.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1d4f86998febcd63769ffabf86ad4177.exe
Resource
win10v20201028
General
-
Target
1d4f86998febcd63769ffabf86ad4177.exe
-
Size
395KB
-
MD5
1d4f86998febcd63769ffabf86ad4177
-
SHA1
827697cbe8330e344117703942328d5ce2027f95
-
SHA256
e273f65f5eff32aa37c8e88a9cc825b4826eabc8b8e708d850a0b4a3bdd60b8a
-
SHA512
a1c7184794b40bb60e70ced361222e65a684368e1b4f7092d0161386a9010c9e8cc8261708bfe445a71251e35298811f8a380a152d9f0092512e4f4205f794c5
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1d4f86998febcd63769ffabf86ad4177.exepid process 384 1d4f86998febcd63769ffabf86ad4177.exe 384 1d4f86998febcd63769ffabf86ad4177.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1d4f86998febcd63769ffabf86ad4177.exedescription pid process Token: SeDebugPrivilege 384 1d4f86998febcd63769ffabf86ad4177.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/384-2-0x0000000000B70000-0x0000000000B81000-memory.dmpFilesize
68KB
-
memory/384-3-0x0000000000230000-0x0000000000265000-memory.dmpFilesize
212KB
-
memory/384-4-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/384-5-0x00000000025E0000-0x00000000025F1000-memory.dmpFilesize
68KB
-
memory/384-6-0x0000000074310000-0x00000000749FE000-memory.dmpFilesize
6.9MB
-
memory/384-7-0x0000000002290000-0x00000000022BA000-memory.dmpFilesize
168KB
-
memory/384-14-0x0000000004D82000-0x0000000004D83000-memory.dmpFilesize
4KB
-
memory/384-13-0x0000000004D81000-0x0000000004D82000-memory.dmpFilesize
4KB
-
memory/384-15-0x0000000004D83000-0x0000000004D84000-memory.dmpFilesize
4KB
-
memory/384-16-0x0000000002570000-0x0000000002598000-memory.dmpFilesize
160KB
-
memory/384-17-0x0000000004D84000-0x0000000004D86000-memory.dmpFilesize
8KB