Analysis

  • max time kernel
    136s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-03-2021 15:43

General

  • Target

    SecuriteInfo.com.Trojan.InjectNET.14.6656.5495.exe

  • Size

    592KB

  • MD5

    ab3b477988b6df60f7d42202f6b0c2c1

  • SHA1

    45eaca4973528c65b27a96f5078c56694f4543de

  • SHA256

    a9c0d0616ae668762302b32276535eb92f09efb470ddfd7f6edbd2ac085bdd23

  • SHA512

    77c5577d3db53b3a6758a2fe2aef42814467a30aeb51d35b30fd148c80bb425dce13b8a52d4bf077561396d0d1d752736b95113082c52c33f96ec6772c2c8fd8

Score
10/10

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.InjectNET.14.6656.5495.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.InjectNET.14.6656.5495.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.InjectNET.14.6656.5495.exe
      "{path}"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/776-2-0x0000000073F20000-0x000000007460E000-memory.dmp
    Filesize

    6.9MB

  • memory/776-3-0x0000000001220000-0x0000000001221000-memory.dmp
    Filesize

    4KB

  • memory/776-5-0x0000000004F90000-0x0000000004F91000-memory.dmp
    Filesize

    4KB

  • memory/776-6-0x00000000004A0000-0x00000000004AB000-memory.dmp
    Filesize

    44KB

  • memory/776-7-0x00000000009A0000-0x00000000009E6000-memory.dmp
    Filesize

    280KB

  • memory/1348-8-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1348-9-0x000000000041E1AA-mapping.dmp
  • memory/1348-10-0x0000000073F20000-0x000000007460E000-memory.dmp
    Filesize

    6.9MB

  • memory/1348-11-0x0000000000400000-0x0000000000426000-memory.dmp
    Filesize

    152KB

  • memory/1348-13-0x00000000008D0000-0x00000000008D1000-memory.dmp
    Filesize

    4KB